subject

A company wants to secure a newly developed application that is used to access sensitive information and data from corporate resources. The application was developed by a third-party organization and it is now being used heavily despite lacking the following controls: -certificate pinning
-Tokenization
-Biometric authentication
The company has already implemented the following controls:
-Full device encryption
-Screen lock
-Device password
-Remote wipe
The company wants to defend against insert interception of data attacks. which of the following compensation controls should the company implement next?
A. Enforce the use a VPN while using newly developed application
B. Implement Geo fencing solution that disables application according to the company requirements
C. Implement out of band second factor to authenticate authorize users
D. Install the application in a secure container requiring additional authentication controls

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 21:40
Simon says is a memory game where "simon" outputs a sequence of 10 characters (r, g, b, y) and the user must repeat the sequence. create a for loop that compares the two strings. for each match, add one point to user_score. upon a mismatch, end the game. sample output with inputs: 'rrgbryybgy' 'rrgbbrybgy'
Answers: 3
question
Computers and Technology, 24.06.2019 13:00
Refer to the figure and match the theorem that supports the statement.οΏΌ1.if chords are =, then arcs are =.if bc = de, then arc bc = arc de2.if arcs are =, then chords are =.if arc bc = arc de, then bc = de3.diameters perpen
Answers: 3
question
Computers and Technology, 24.06.2019 18:30
What is the local portion of the e-mail address below? [email protected] a.) @ b.) biz c.) gumchewer d.) twrigley
Answers: 1
question
Computers and Technology, 24.06.2019 22:00
According to your study unit, what is the main reason that improved human relations skills may improve your grades?
Answers: 1
You know the right answer?
A company wants to secure a newly developed application that is used to access sensitive information...
Questions
question
Geography, 12.04.2021 14:00
question
Physics, 12.04.2021 14:00
question
Chemistry, 12.04.2021 14:00
question
Social Studies, 12.04.2021 14:00
question
Physics, 12.04.2021 14:00
question
English, 12.04.2021 14:00
Questions on the website: 13722359