Choose the one phrase below that best describes Patrick’s proposal.

Patrick has been hired to devise a security solution for a company that provides in-home care.
Visiting Nurses use Internet connections to transmit confidential patient data to a database server
located at the corporate office.
The visiting Nurses at the remote locations must have a secure connection to the database server
to protect patient confidentiality. The database server itself must also be protected from external
threats. The human resources department would like to have access to information about their
Nurses access the database server. Accounting would like to offer Nurses the option of submitting
their time sheets from remote locations, provided this can be accomplished in a secure manner.
Patrick proposes installing Check Point VPN/Firewall-1 at the perimeter of the corporate LAN. He
recommends installing Check Point Secure Client in the laptops used by the visiting Nurses.
Patrick suggests rules allowing only client-authenticated traffic to the accounting server. To reduce
resource consumption, Patrick advises his customer not to log any traffic passing through the
Enforcement Module. Choose the one phrase below that best describes Patrick’s proposal.

Patrick has been hired to devise a security solution for a company that provides in-home care.
Visiting Nurses use Internet connections to transmit confidential patient data to a database server
located at the corporate office.
The visiting Nurses at the remote locations must have a secure connection to the database server
to protect patient confidentiality. The database server itself must also be protected from external
threats. The human resources department would like to have access to information about their
Nurses access the database server. Accounting would like to offer Nurses the option of submitting
their time sheets from remote locations, provided this can be accomplished in a secure manner.
Patrick proposes installing Check Point VPN/Firewall-1 at the perimeter of the corporate LAN. He
recommends installing Check Point Secure Client in the laptops used by the visiting Nurses.
Patrick suggests rules allowing only client-authenticated traffic to the accounting server. To reduce
resource consumption, Patrick advises his customer not to log any traffic passing through the
Enforcement Module. Choose the one phrase below that best describes Patrick’s proposal.

A.
The proposed solution meets the required objectives and none of the desired objectives.

B.
The proposed solution meets the required objectives and only one of the desired objectives.

C.
The proposed solution meets the required objectives and all desired objectives.

D.
The proposed solution does not meet the required objective.

Explanation:

: With the Patrick’s proposal you can achieve the security of the database server because it is
behind the VPN1/FW1 that is in the perimeter in the LAN, the remote communication of the nurses
is secure, because they have Secure Client installed on their laptops. The only objective that is not
met is the Human Resources department track of the database use, this is because Patrick
recommends no logging in the enforcement module.



Leave a Reply 0

Your email address will not be published. Required fields are marked *