Question 5:
A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data owner has established the following security requirements: ✑ The data is for internal consumption only and shall not be distributed to outside individuals ✑ The systems administrator should not have access to the data processed by the server ✑ The integrity of the kernel image is maintained
Which of the following host-based security controls BEST enforce the data owner`s requirements? (Choose three.)
Answer options:
A. SELinux B. DLP C. HIDS D. Host-based firewall E. Measured boot F. Data encryption G. Watermarking