Which two actions limit the consequences of a network based attack?
A.
Implementing the principle of least privilege
B.
Installing a firewall at the outer boundary of your systems
C.
Placing Internet-accessible servers in a demilitarized zone
D.
Deploying a single sign-on system to provide system-wide authorization
E.
Allowing application servers privileged access to all databases
I think A is correct, since it essentially says what E says but just applies to more scenarios. I also think C is more correct than B. I would have gone A and C
i will go for A and E
You are joking about E right ? 😀
AC
AB
AC
BC
AC
BC
BC
AC would be correct answer.
Why A ? the scenario is that there is already a network based attack .that implies the attacker is thru the outer firewall