Which of the following methods should the company consider to secure this data in the future?

Customers’ credit card information was stolen from a popular video streaming company. A
security consultant determined that the information was stolen, while in transit, from the
gaming consoles of a particular vendor. Which of the following methods should the company
consider to secure this data in the future?

Customers’ credit card information was stolen from a popular video streaming company. A
security consultant determined that the information was stolen, while in transit, from the
gaming consoles of a particular vendor. Which of the following methods should the company
consider to secure this data in the future?

A.
Application firewalls

B.
Manual updates

C.
Firmware version control

D.
Encrypted TCP wrappers



Leave a Reply 2

Your email address will not be published. Required fields are marked *

4 − 4 =


vladimir

vladimir

Please, can anyone explain why.

t-turbo

t-turbo

The question stated that “was stolen while in transit”; an encrypted TCP wrapper is exactly what it sounds like, it acts as a wrapper around TCP (Transmission control protocol) and encrypt that transmission.