Customers’ credit card information was stolen from a popular video streaming company. A security consultant
determined that the information was stolen, while in transit, from the gaming consoles of a particular vendor.
Which of the following methods should the company consider securing this data in the future?

A.
Application firewalls
B.
Manual updates
C.
Firmware version control
D.
Encrypted TCP wrappers
Explanation:
Wrapping sensitive systems with a specific control is required when protecting data in transit. TCP wrappers
are also security controls. TCP Wrapper is a host-based networking ACL system, used to filter network access
to Internet Protocol servers on (Unix-like) operating systems such as Linux or BSD. It allows host or
subnetwork IP addresses, names and/or inetd query replies, to be used as tokens on which to filter for access
control purposes.
TCP Wrapper should not be considered a replacement for a properly configured firewall. Instead, TCP Wrapper
should be used in conjunction with a firewall and other security enhancements in order to provide another layer
of protection in the implementation of a security policy.