At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why did he say that?
A. It is an unproven approach and has never been tested.
B. It would be too costly to have one isolated server by itself.
C. It would be essentially impossible to keep its location a secret from everyone.
D. It depends too heavily upon non-repudiation in order for it to succeed.
C. It would be essentially impossible to keep its location a secret from everyone.
You might also like to view...
With _________ the linking to shared library routines is deferred until load time so that if changes are made any program that references the library is unaffected.
a. statically linked shared libraries b. dynamically linked shared libraries c. system linked shared libraries d. all of the above
The purpose of the ____ process is to monitor the actions of the supplier organization and bring any deviations in required practice to the attention of the supplier and the acquiring organization's management.
A. security review B. security audit C. security profile D. security verification