The Linux server at Company A hosts a graphical application widely used by the company
designers. One designer regularly connects to the server from a Mac laptop in the designer’s
office down the hall. When the security engineer learns of this it is discovered the connection is not
secured and the password can easily be obtained via network sniffing. Which of the following
would the security engineer MOST likely implement to secure this connection?
Linux Server: 192.168.10.10/24
Mac Laptop: 192.168.10.200/24
A.
From the server, establish an SSH tunnel to the Mac and VPN to 192.168.10.200.
B.
From the Mac, establish a remote desktop connection to 192.168.10.10 using Network Layer
Authentication and the CredSSP security provider.
C.
From the Mac, establish a VPN to the Linux server and connect the VNC to 127.0.0.1.
D.
From the Mac, establish a SSH tunnel to the Linux server and connect the VNC to 127.0.0.1.