Multiple Choice
An organization is considering the use of a thin client architecture as it moves to a cloud-hosted environment. A security analyst is asked to provide thoughts on the security advantages of using thin clients and virtual workstations. Which of the following are security advantages of the use of this combination of thin clients and virtual workstations?
A) Malicious insiders will not have the opportunity to tamper with data at rest and affect the integrity of the system.
B) Thin client workstations require much less security because they lack storage and peripherals that can be easily compromised, and the virtual workstations are protected in the cloud where security is outsourced.
C) All thin clients use TPM for core protection, and virtual workstations use vTPM for core protection with both equally ensuring a greater security advantage for a cloud-hosted environment.
D) Malicious users will have reduced opportunities for data extractions from their physical thin client workstations, this reducing the effectiveness of local attacks.
Correct Answer:

Verified
Correct Answer:
Verified
Q55: An organization is deploying IoT locks, sensors,
Q56: An organization is in the process of
Q57: An organization enables BYOD but wants to
Q58: A new employee is plugged into the
Q59: A security engineer is designing a system
Q61: An organization is improving its web services
Q62: A development team releases updates to an
Q63: While conducting a BIA for a proposed
Q64: Developers are working on a new feature
Q65: A security manager needed to protect a