Which of the following BEST describes how to adapt to the threat?

The security administrator is responsible for the confidentiality of all corporate data. The
company’s servers are located in a datacenter run by a different vendor. The vendor datacenter
hosts servers for many different clients, all of whom have access to the datacenter. None of the
racks are physically secured. Recently, the company has been the victim of several attacks
involving data injection and exfiltatration. The security administrator suspects these attacks are
due to several new network based attacks facilitated by having physical access to a system.
Which of the following BEST describes how to adapt to the threat?

The security administrator is responsible for the confidentiality of all corporate data. The
company’s servers are located in a datacenter run by a different vendor. The vendor datacenter
hosts servers for many different clients, all of whom have access to the datacenter. None of the
racks are physically secured. Recently, the company has been the victim of several attacks
involving data injection and exfiltatration. The security administrator suspects these attacks are
due to several new network based attacks facilitated by having physical access to a system.
Which of the following BEST describes how to adapt to the threat?

A.
Apply port security to all switches, switch to SCP, and implement IPSec tunnels between
devices.

B.
Apply two factor authentication, require point to point VPNs, and enable log auditing on all
devices.

C.
Apply port security to all routers, switch to telnet, and implement point to point VPNs on all
servers.

D.
Apply three factor authentication, implement IPSec, and enable SNMP.



Leave a Reply 0

Your email address will not be published. Required fields are marked *