which one of the following can be implemented to mitigate the risks on a corporate network?

To support legacy applications that rely on risky protocols (e.g,, plain text passwords), which one
of the following can be implemented to mitigate the risks on a corporate network?

To support legacy applications that rely on risky protocols (e.g,, plain text passwords), which one
of the following can be implemented to mitigate the risks on a corporate network?

A.
Implement strong centrally generated passwords to control use of the vulnerable applications.

B.
Implement a virtual private network (VPN) with controls on workstations joining the VPN.

C.
Ensure that only authorized trained users have access to workstations through physical access
control.

D.
Ensure audit logging is enabled on all hosts and applications with associated frequent log
reviews.

Explanation:
It makes more sense to provide VPN client to workstations opposed to physically
securing workstations.



Leave a Reply 0

Your email address will not be published. Required fields are marked *