Which of the following is the use of the ACL in this situation an example of?

As part of a systems modernization program, the use of a weak encryption algorithm is identified m a wet se-vices API. The client using the API is unable to upgrade the system on its end which would support the use of a secure algorithm set As a temporary workaround the client provides its IP space and the network administrator Limits access to the API via an ACL to only the IP space held by the client .

Which of the following is the use of the ACL in this situation an example of?
A . Avoidance
B . Transference
C . Mitigation
D . Acceptance
E . Assessment

Answer: C

Latest CAS-003 Dumps Valid Version with 509 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments