PrepAway - Latest Free Exam Questions & Answers

Which of the following methods should the company consider to secure this data in the future?

Customers’ credit card information was stolen from a popular video streaming company. A security
consultant determined that the information was stolen, while in transit, from the gaming consoles
of a particular vendor. Which of the following methods should the company consider to secure this
data in the future?

PrepAway - Latest Free Exam Questions & Answers

A.
Application firewalls

B.
Manual updates

C.
Firmware version control

D.
Encrypted TCP wrappers

Explanation:
Wrapping sensitive systems with a specific control is required when protecting data in transit. TCP
wrappers are also security controls. TCP Wrapper is a host-based networking ACL system, used
to filter network access to Internet Protocol servers on (Unix-like) operating systems such as Linux

or BSD. It allows host or subnetwork IP addresses, names and/or inetd query replies, to be used
as tokens on which to filter for access control purposes.
TCP Wrapper should not be considered a replacement for a properly configured firewall. Instead,
TCP Wrapper should be used in conjunction with a firewall and other security enhancements in
order to provide another layer of protection in the implementation of a security policy.


Leave a Reply