Which of the follow...
 
Notifications
Clear all

Which of the following is a sound network configuration practice to enhance information security?

1 Posts
1 Users
0 Likes
129 Views
(@ozolinsezequiel)
Posts: 701
Noble Member
Topic starter
 

Which of the following is a sound network configuration practice to enhance information security?

  • A . Change management practices to ensure operating system patch documentation is retained.
    B. User role requirements are documented in accordance with appropriate application-level control needs.
    C. Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.
    D. Interfaces reinforce segregation of duties between operations administration and database development.

Show Answer Hide Answer

Suggested Answer: C
 
Posted : 14/11/2022 7:51 pm

Latest IIA IIA-CIA-Part3 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: