Which of the following should be implemented for privileged users so they can support the environment from their workstations while remaining compliant?

A security compliance requirement states that specific environments that handle sensitive data must be protected by need-to-know restrictions and can only connect to authorized endpoints. The requirement also states that a DLP solution within the environment must be used to control the data from leaving the environment.

Which of the following should be implemented for privileged users so they can support the environment from their workstations while remaining compliant?
A . NAC to control authorized endpoints
B . FIM on the servers storing the data
C . A jump box in the screened subnet
D . A general VPN solution to the primary network

Answer: A

Explanation:

Network Access Control (NAC) is used to bolster the network security by restricting the availability of network resources to managed endpoints that don’t satisfy the compliance requirements of the Organization.

Latest CAS-004 Dumps Valid Version with 128 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments