List of questions
Related questions
Question 91 - CCAK discussion
Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, ports, and by compensating controls. Which of the following controls BEST matches this control description?
A.
Network Security
B.
Change Detection
C.
Virtual Instance and OS Hardening
D.
Network Vulnerability Management
Your answer:
0 comments
Sorted by
Leave a comment first