Which of the following host-based security controls BEST enforce the data owner’s requirements? (Choose three.)

Last Updated on August 8, 2021 by Admin 3

A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data owner has established the following security requirements:

– The data is for internal consumption only and shall not be distributed to outside individuals
– The systems administrator should not have access to the data processed by the server
– The integrity of the kernel image is maintained

Which of the following host-based security controls BEST enforce the data owner’s requirements? (Choose three.)

  • SELinux
  • DLP
  • HIDS
  • Host-based firewall
  • Measured boot
  • Data encryption
  • Watermarking
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments