اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 625 من 1040

كل الأسئلة

A risk assessment concludes that the perimeter network has the highest potential for compromise by an attacker, and it is labeled as a critical risk environment. Which of the following is a valid compensating control to reduce the volume of valuable information in the perimeter network that an attacker could gain using active reconnaissance techniques?

الخيارات

  • A A control that demonstrates that all systems authenticate using the approved authentication method
  • B A control that demonstrates that access to a system is only allowed by using SSH
  • C A control that demonstrates that firewall rules are peer reviewed for accuracy and approved before deployment
  • D A control that demonstrates that the network security policy is reviewed and updated yearly

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.