The company that you work for has implemented the following security controls: • All workstations have the latest patches and antivirus, • All sensitive data is encrypted in transit. • Dual-factor user authentication is used. • A firewall at the edge of the network is implemented. What is missing from this security posture?
A. no local encryption
B. weak user authentication
C. insufficient edge control
D. exposure to viruses
A
Explanation: While transport encryption has been enabled, the sensitive data should also be encrypted on the hard drives as well.
Computer Science & Information Technology
You might also like to view...
What is essentially a log of the different access and accounting requests and responses sent between RADIUS clients and RADIUS servers?
A. RADIUS accounting B. Event logs C. Microsoft SQL Server XML D. NPS accounting
Computer Science & Information Technology
Research continues to focus on finding the optimum allocation scheme.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology