SY0-701 · Question #488
SY0-701 Question #488: Real Exam Question with Answer & Explanation
The correct answer is C: SSH tunneling. SSH tunneling can secure the unencrypted protocol by encapsulating traffic in an encrypted tunnel. Segmentation isolates the legacy system, reducing the risk of unauthorized access.
Question
A security administrator is addressing an issue with a legacy system that communicates data using an unencrypted protocol to transfer sensitive data to a third party. No software updates that use an encrypted protocol are available, so a compensating control is needed. Which of the following are the most appropriate for the administrator to suggest? (Select two.)
Options
- ATokenization
- BCryptographic downgrade
- CSSH tunneling
- DSegmentation
- EPatch installation
- FData masking
Explanation
SSH tunneling can secure the unencrypted protocol by encapsulating traffic in an encrypted tunnel. Segmentation isolates the legacy system, reducing the risk of unauthorized access.
Community Discussion
No community discussion yet for this question.