Which of the following is the MOST effective solution for preventing individuals external to the organization from modifying sensitive information on a corporate database?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:December 23, 2021
  • Reading time:1 mins read

Last Updated on December 23, 2021 by Admin

Which of the following is the MOST effective solution for preventing individuals external to the organization from modifying sensitive information on a corporate database?

  • Screened subnets
  • Information classification policies and procedures
  • Role-based access controls
  • Intrusion detection system (IDS)
Explanation:

Screened subnets are demilitarized zones (DMZs) and are oriented toward preventing attacks on an internal network by external users. The policies and procedures to classify information will ultimately result in better protection but they will not prevent actual modification. Role-based access controls would help ensure that users only had access to files and systems appropriate for their job role. Intrusion detection systems (IDS) are useful to detect invalid attempts but they will not prevent attempts.

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments