CompTIA Exam Questions

Which of the following methods should the company consider to secure this data in the future?

Customers’ credit card information was stolen from a popular video streaming company. A security
consultant determined that the information was stolen, while in transit, from the gaming consoles
of a particular vendor. Which of the following methods should the company consider to secure this
data in the future?

A.
Application firewalls

B.
Manual updates

C.
Firmware version control

D.
Encrypted TCP wrappers

Explanation:
Wrapping sensitive systems with a specific control is required when protecting data in transit. TCP
wrappers are also security controls. TCP Wrapper is a host-based networking ACL system, used
to filter network access to Internet Protocol servers on (Unix-like) operating systems such as Linux

or BSD. It allows host or subnetwork IP addresses, names and/or inetd query replies, to be used
as tokens on which to filter for access control purposes.
TCP Wrapper should not be considered a replacement for a properly configured firewall. Instead,
TCP Wrapper should be used in conjunction with a firewall and other security enhancements in
order to provide another layer of protection in the implementation of a security policy.