PrepAway - Latest Free Exam Questions & Answers

Which of the following solutions would mitigate this issue?

After a company has standardized to a single operating system, not all servers are immune to a
well-known OS vulnerability. Which of the following solutions would mitigate this issue?

PrepAway - Latest Free Exam Questions & Answers

A.
Host based firewall

B.
Initial baseline configurations

C.
Discretionary access control

D.
Patch management system

2 Comments on “Which of the following solutions would mitigate this issue?

  1. Earlean says:

    I simply desired to appreciate you yet again. I do not know the things I could possibly have handled in the absence of the actual recommendations shared by you on this subject matter. Certainly was an absolute horrifying issue in my circumstances, nevertheless discovering your well-written strategy you treated that forced me to jump over happiness. Now i am grateful for this guidance and in addition have high hopes you know what an amazing job you were providing instructing some other people via your websites. I am sure you haven’t come across any of us.

    http://healthteazone.com/white-tea/




    0



    0
  2. meac says:

    We now have a single OS throughout. We need to protect it from vulnerabilities. The only one that comes close is (D) Patch management system
    A patch is an update to a system. Sometimes a patch adds new functionality; in other cases, it corrects a bug in the software.
    Patch Management can thus be used to fix security problems discovered within the OS thus negating a known OS vulnerability.
    Wrong answers:
    A-Host based firewall: Will do nothing to mitigate the vulnerabilities of the OS
    B-Initial baseline configurations. Will do nothing to mitigate the vulnerabilities of the OS. Added to that, we already know that the OS of some servers is not immune to a well-known OS vulnerability. Such information is obtained from running an initial baseline.
    C-Discretionary access control – (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria “as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. Will do nothing to mitigate the vulnerabilities of the OS




    0



    0

Leave a Reply