An auditor is reviewing the following logs from the company’s proxy server used to store both sensitive and public documents. The documents are edited via a client
web interface and all processing is performed on the server side.
http://www.documents-portal.com/editdoc.php?document1=this%20is%20the%20content%20of%20document1
http://www.documents-portal.com/editdoc.php?document2=this%20is%20the%20content%20of%20document2
http://www.documents-portal.com/editdoc.php?document3=this%20is%20the%20content%20of%20document3

A.
Two-factor authentication should be implemented for sensitive documents.
B.
Sensitive documents should be signed using enterprise PKI.
C.
Encryption should be implemented at the transport level.
D.
Document hashing should be done to preserve document integrity.
What exactly is being asked here??? I think the question is missing …..
0
0
The question is missing. I suppose it can assume to ask:
“What is the BEST way to secure the transfer of these files from the file server to the client?”
0
0