The Chief Information Officer (CIO) of a large healthcare institution is concerned about all machines having direct access to sensitive patient information. Which of the following should the security analyst implement to BEST mitigate the risk of sensitive data exposure?
A. A cloud access service broker system
B. NAC to ensure minimum standards are met
C. MFA on all workstations
D. Network segmentation
Answer: D. Network segmentation
You might also like to view...
The bubble sort algorithm works by
A) repeatedly comparing adjacent items and swapping them so smaller values come before larger values B) repeatedly locating the smallest value in the unsorted portion of the array and moving it toward the lower end of the array C) repeatedly taking the first value in the unsorted portion of the array and placing it at its proper place in the part of the array that is already sorted D) partitioning the unsorted portion of the array into two sublists and a pivot and recursively sorting the two sublists
Describe the function of the system clock.
What will be an ideal response?