Network-layer and transport-layer controls: These controls involve measures such as firewalls, VPNs (Virtual Private Networks), encryption, and network segmentation. Implementing strong network-layer and transport-layer controls helps secure communication between remote users and the hypervisor interface, reducing the risk of unauthorized access or interception of sensitive data.
Answer B.
ChatGpt: Implementing comprehensive enterprise security policies and controls specifically tailored to remote access scenarios can effectively mitigate associated risks.
Isaca Stdy Guide 27th on page 246 (Risks associated with Cloud Computing):
If possible includes a right of audit in the contract and Include in the contract language that requires that a CSP to be aligned with the enterprise´s security policy and to implement necessary controls to ensure it.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Swallows
1 month, 2 weeks agoMJORGER
4 months, 2 weeks agoMJORGER
2 months ago