PrepAway - Latest Free Exam Questions & Answers

Which of the following methods should the company consider to secure this data in the future?

Customers’ credit card information was stolen from a popular video streaming company. A
security consultant determined that the information was stolen, while in transit, from the
gaming consoles of a particular vendor. Which of the following methods should the company
consider to secure this data in the future?

PrepAway - Latest Free Exam Questions & Answers

A.
Application firewalls

B.
Manual updates

C.
Firmware version control

D.
Encrypted TCP wrappers

3 Comments on “Which of the following methods should the company consider to secure this data in the future?

  1. t-turbo says:

    The question stated that “was stolen while in transit”; an encrypted TCP wrapper is exactly what it sounds like, it acts as a wrapper around TCP (Transmission control protocol) and encrypt that transmission.




    0



    0
  2. meac says:

    A concept being dealt by Security+ exams is whether data is “data at rest” , “data in use” or “data in transit”

    • Data at rest generally refers to data stored in persistent storage (disk, tape)
    • Data in use generally refers to data being processed by a computer central processing unit (CPU) or in random access memory (RAM, also referred to as main memory or simply memory).
    • Data in transit: Data in transit is defined into two categories, information that flows over the public or untrusted network such as the internet and data which flows in the confines of a private network such as a corporate or enterprise Local Area Network (LAN).

    The question in here clearly state that “that the information was stolen, while in transit”…so we are speaking “Data in transit” as a result.

    PROCESS OF ELIMINATION
    Now let’s eliminate the blatanlty incorrect answers:
    (B) Manual updates will not deal with the isssue at hand or deal with data in transit. This is for Data at rest
    (C) Firmware version control will not deal with the isssue at hand or deal with data in transit. This is for Data at rest.

    So the answer is a tossup between A and D
    Yet, :(A) Application firewalls cannot control what happens after data leaves them or before it enters them. They are end protections, but provides no security during transit as such. So the data was lost in the hiatus when data left one firewall and before it arrived to another (in transit)

    The only option is indeed “D) Encrypted TCP wrappers”
    Wrapping sensitive systems with a specific control is required when protecting data in transit.
    TCP wrappers are also security controls.
    TCP Wrapper is a host-based networking ACL system, used to filter network access to Internet Protocol servers on (Unix-like) operating systems such as Linux or BSD.
    It allows host or subnetwork IP addresses, names and/or inetd query replies, to be used as tokens on which to filter for access control purposes.
    TCP Wrapper should not be considered a replacement for a properly configured firewall.
    Instead, TCP Wrapper should be used in conjunction with a firewall and other security enhancements in order to provide another layer of protection in the implementation of a security policy.




    0



    0

Leave a Reply