Multiple Choice
A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data owner has established the following security requirements: The data is for internal consumption only and shall not be distributed to outside individuals The systems administrator should not have access to the data processed by the server The integrity of the kernel image is maintained Which of the following host-based security controls BEST enforce the data owner's requirements? (Choose three.)
A) SELinux
B) DLP
C) HIDS
D) Host-based firewall
E) Measured boot
F) Data encryption
G) Watermarking
Correct Answer:

Verified
Correct Answer:
Verified
Q227: A development team is testing an in-house-developed
Q228: The Chief Executive Officers (CEOs) from two
Q229: A company has entered into a business
Q230: An insurance company has two million customers
Q231: A financial institution's information security officer is
Q233: An organization is in the process of
Q234: A security engineer is attempting to convey
Q235: A company's existing forward proxies support software-based
Q236: Following a recent data breach, a company
Q237: A company contracts a security engineer to