Question

In: Computer Science

A company is migrating systems from an on-premises facility to a third-party managed datacenter. For continuity...

A company is migrating systems from an on-premises facility to a third-party managed datacenter. For continuity of operations and business agility, remote access to all hardware platforms must be available at all times. Access controls need to be very robust and provide an audit trail.

Which of the following security controls will meet the company’s objectives? (Select two.)

A. Integrated platform management interfaces are configured to allow access only via SSH

B. Access to hardware platforms is restricted to the systems administrator’s IP address

C. Access is captured in event logs that include source address, time stamp, and outcome

D. The IP addresses of server management interfaces are located within the company’s extranet

E. Access is limited to interactive logins on the VDi

F. Application logs are hashed cryptographically and sent to the SIEM

Solutions

Expert Solution

D. The IP addresses of server management interfaces are located within the company’s extranet
Explanation:- The option is preferred as the IP addresses for the server management interfaces are within extranet where firewall rules/security rules , would keep all details masked and within extranet . This would be accessed by authenticated business users outside organization as per access control. It will not be completely available on internet so robustness is achieved. The main reason behind keeping all these IP addresses within extranet is your customized security layers would be applied to enhance security achieving security goal to make it robust but along with it as a part of continuity process for business and operations where some users would be outside the organizations also need access to the company resources.
              
C. Access is captured in event logs that include source address, time stamp, and outcome
Explanation:- Capturing logs related to all kind of access to the assets needs to be captured and thoroughly monitored to restrict unauthorized access to the organization. Access to the resources should be restricted and also server access controls should be audited in order to remediate unwanted access.  All the NTFS shares also to restrict as per standard access control policy. Non-authenticated access should be strictly blocked/revoked if found any vulnerability. Various security scanning tools can be used to scan and revoke/block Non-authenticated access.

              


Related Solutions

Discuss the role of managed care organizations and third-party payers and their impact within your health...
Discuss the role of managed care organizations and third-party payers and their impact within your health care organization.
A _______ is a required (by third-party payers) list of medications that must be selected from...
A _______ is a required (by third-party payers) list of medications that must be selected from by physicians for their patients in the hospital.
Analyze the reporting guidelines of third-party payer payment systems. What opportunities and challenges do they present...
Analyze the reporting guidelines of third-party payer payment systems. What opportunities and challenges do they present for healthcare leaders in meeting reporting requirements?
A third party who is intended to directly benefit from a contract made by two contracting...
A third party who is intended to directly benefit from a contract made by two contracting parties, is called an incidental beneficiary T/F If a contract states I assign all my rights under the contract , in most cases the assignment will be considered as assignment of rights but not duties T/F In order for an assignment to be valid, you must use an assignment form T/F A material breach does not discharge the non-breaching party from his obligations under...
Provide an example of a third party benefiting from a prisoner’s dilemma outcome while the game...
Provide an example of a third party benefiting from a prisoner’s dilemma outcome while the game participants are worse off relative to other possible outcomes. Also, explain the nature of the benefit. How can a repeated game help in resolving a prisoner’s dilemma outcome? Why is game theory important to economics?
With its innovative strategy of transforming logistics delivery to third party from traditional carriers such as...
With its innovative strategy of transforming logistics delivery to third party from traditional carriers such as USPS, UPS and FedEx, can Amazon succeed in reducing its logistic costs and fulfilling its promise to efficiently deliver the brown box to its customer in 2 days? PLEASE SUPPORT ANSWERS WITH PROPER DATA DESCRIPTIONS.
Third party conflict resolution: The Seatcor Manufacturing Company In regards to the scenario below, what is...
Third party conflict resolution: The Seatcor Manufacturing Company In regards to the scenario below, what is the best strategy to use? Thanks! ********************* Third-Party Conflict Resolution Introduction In addition to being involved in their own conflicts, managers are often called upon to intervene and to settle conflicts between other people. The two activities in this section are designed to explore how third parties may enter conflicts for the purpose of resolving them, and to practice one very effective approach to...
The EU accuses Amazon of scooping up data from third-party sellers and using that information to...
The EU accuses Amazon of scooping up data from third-party sellers and using that information to compete against them (e.g., launching similar products). How and where would you draw the lines on Amazon’s ability to utilize this type of data, if at all, in its business practices? Make a distinction between legal lines and ethically-defensible lines
During its prior tax year, your client acquired from a third party a license granted by...
During its prior tax year, your client acquired from a third party a license granted by the federal government. The client tells you that he/she believes that the license has a useful life of 8 years and produces a report, prepared by another firm, supporting that useful life. You look at the report and do not believe that it is very convincing. Discuss how you would handle this situation keeping in mind any ethical and professional considerations. What are the...
What are some potential “third-party effects” in the large-scale transferring of water rights from agricultural to...
What are some potential “third-party effects” in the large-scale transferring of water rights from agricultural to urban areas?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT