Which of the following would be the MOST secure control implement?

An investigation showed a worm was introduced from an engineer’s laptop. It was determined the company does not provide engineers with company-owned laptops, which would be subject to a company policy and technical controls.

Which of the following would be the MOST secure control implement?
A . Deploy HIDS on all engineer-provided laptops, and put a new router in the management network.
B . Implement role-based group policies on the management network for client access.
C . Utilize a jump box that is only allowed to connect to client from the management network.
D . Deploy a company-wide approved engineering workstation for management access.

Answer: A

Latest CAS-003 Dumps Valid Version with 509 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments