subject

A company wants to secure a newly developed application that is used to access sensitive information and data from corporate resources. The application was developed by a third-party organization and it is now being used heavily despite lacking the following controls: -certificate pinning
-Tokenization
-Biometric authentication
The company has already implemented the following controls:
-Full device encryption
-Screen lock
-Device password
-Remote wipe
The company wants to defend against insert interception of data attacks. which of the following compensation controls should the company implement next?
A. Enforce the use a VPN while using newly developed application
B. Implement Geo fencing solution that disables application according to the company requirements
C. Implement out of band second factor to authenticate authorize users
D. Install the application in a secure container requiring additional authentication controls

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 14:30, qxchung7310
The “rule of 72” is used to approximate the time required for prices to double due to inflation. if the inflation rate is r%, then the rule of 72 estimates that prices will double in 72/r years. for instance, at an inflation rate of 6%, prices double in about 72/6 or 12 years. write a program to test the accuracy of this rule. for each interest rate from 1% to 20%, the program should display the rounded value of 72/r and the actual number of years required for prices to double at an r% inflation rate. (assume prices increase at the end of each year.)
Answers: 1
image
Computers and Technology, 23.06.2019 01:00, leo4687
Complete the sentence about a presentation delivery method
Answers: 2
image
Computers and Technology, 23.06.2019 07:30, emilyplays474
What key should you press and hold to select and open multiple files at one time? enter alt control esc
Answers: 1
image
Computers and Technology, 24.06.2019 03:30, glitch14
It is not necessary to develop strategies to separate good information and bad information on the internet. true or false
Answers: 1
You know the right answer?
A company wants to secure a newly developed application that is used to access sensitive information...

Questions in other subjects:

Konu
Mathematics, 09.09.2021 04:30
Konu
Mathematics, 09.09.2021 04:30