Which two actions limit the consequences of a network based attack?

Which two actions limit the consequences of a network based attack?

Which two actions limit the consequences of a network based attack?

A.
Implementing the principle of least privilege

B.
Installing a firewall at the outer boundary of your systems

C.
Placing Internet-accessible servers in a demilitarized zone

D.
Deploying a single sign-on system to provide system-wide authorization

E.
Allowing application servers privileged access to all databases



Leave a Reply 11

Your email address will not be published. Required fields are marked *


DonkeyNuts

DonkeyNuts

I think A is correct, since it essentially says what E says but just applies to more scenarios. I also think C is more correct than B. I would have gone A and C

Thomas

Thomas

i will go for A and E

Pesho

Pesho

You are joking about E right ? 😀

Ashishkumar

Ashishkumar

BC

Ashishkumar

Ashishkumar

AC would be correct answer.

Why A ? the scenario is that there is already a network based attack .that implies the attacker is thru the outer firewall