A Mysql instance is running on a dedicated server. Developers access the server from the
same network subnet. Users access the database through an application that is running on
a separate server in a DMZ. Which two will optimize the security of this setup?
A.
Disabling connections from named pipes or socket files (depending on the operating
system of the server)
B.
Enabling and using SSL for connections to the Mysql database
C.
Installing Mysql on the application server, and running the database and application on
the same server
D.
Starting the server with – bind- address=0.0.0.0 specified
E.
Running the server with – skip-networking specified
F.
Limiting logins to originate from the application server or the server’s subnet
B,F
B F