Which of the following is a sound network configuration practice to enhance information security?

Which of the following is a sound network configuration practice to enhance information security?
A . Change management practices to ensure operating system patch documentation is retained.
B . User role requirements are documented in accordance with appropriate application-level control needs.
C . Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.
D . Interfaces reinforce segregation of duties between operations administration and database development.

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments