subject

A company wants to secure a newly developed application that is used to access sensitive information and data from corporate resources. The application was developed by a third-party organization and it is now being used heavily despite lacking the following controls: -certificate pinning
-Tokenization
-Biometric authentication
The company has already implemented the following controls:
-Full device encryption
-Screen lock
-Device password
-Remote wipe
The company wants to defend against insert interception of data attacks. which of the following compensation controls should the company implement next?
A. Enforce the use a VPN while using newly developed application
B. Implement Geo fencing solution that disables application according to the company requirements
C. Implement out of band second factor to authenticate authorize users
D. Install the application in a secure container requiring additional authentication controls

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 19:50
Python write an expression that executes the loop body as long as the user enters a non-negative number. note: if the submitted code has an infinite loop, the system will stop running the code after a few seconds and report "program end never reached." the system doesn't print the test case that caused the reported message. sample outputs with inputs: 9 5 2 -1
Answers: 3
question
Computers and Technology, 22.06.2019 15:30
When creating a budget, log fixed expenses before income. after income. after savings. at the top.
Answers: 1
question
Computers and Technology, 23.06.2019 13:30
Me ! evelyn is a manager in a retail unit. she wants to prepare a report on the projected profit for the next year. which function can she use? a. pmt b. round c. division d. what-if analysis
Answers: 2
question
Computers and Technology, 23.06.2019 15:30
The song about casey jones a railroad engineer who gives his life on the job would most likely gall under the folk song category of? a-work song b-nonsense song c-religious song d-ballad
Answers: 1
You know the right answer?
A company wants to secure a newly developed application that is used to access sensitive information...
Questions
question
Mathematics, 17.09.2019 11:30
question
Mathematics, 17.09.2019 11:30
Questions on the website: 13722362