Which of the following security controls is the BEST to apply to this architecture?

A system architect has the following constraints from the customer:
Confidentiality, Integrity, and Availability (CIA) are all of equal importance.
Average availability must be at least 6 nines (99.9999%).
All devices must support collaboration with every other user device.
All devices must be VoIP and teleconference ready.
Which of the following security controls is the BEST to apply to this architecture?

A system architect has the following constraints from the customer:
Confidentiality, Integrity, and Availability (CIA) are all of equal importance.
Average availability must be at least 6 nines (99.9999%).
All devices must support collaboration with every other user device.
All devices must be VoIP and teleconference ready.
Which of the following security controls is the BEST to apply to this architecture?

A.
Deployment of multiple standard images based on individual hardware configurations,
employee choice of hardware and software requirements, triple redundancy of all processing
equipment.

B.
Enforcement of strict network access controls and bandwidth minimization techniques, a single
standard software image, high speed processing, and distributed backups of all equipment in the
datacenter.

C.
Deployment of a unified VDI across all devices, SSD RAID in all servers, multiple identical hot
sites, granting administrative rights to all users, backup of system critical data.

D.
Enforcement of security policies on mobile/remote devices, standard images and device
hardware configurations, multiple layers of redundancy, and backup on all storage devices.



Leave a Reply 0

Your email address will not be published. Required fields are marked *