WGU Cybersecurity Architecture and Engineering (KFO1/D488) Cybersecurity-Architecture-and-Engineering Question # 27 Topic 3 Discussion

WGU Cybersecurity Architecture and Engineering (KFO1/D488) Cybersecurity-Architecture-and-Engineering Question # 27 Topic 3 Discussion

Cybersecurity-Architecture-and-Engineering Exam Topic 3 Question 27 Discussion:
Question #: 27
Topic #: 3

A software development company uses file transfer protocol (FTP) to transfer software code between different teams.

Which security control is essential for protecting the integrity of software code that is transferred using FTP?


A.

Calculating and comparing the hash values of the software code before and after transfer using FTP can help detect any changes and ensure the integrity of the code.


B.

Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the FTP server and software code.


C.

Enforcing strict access controls can limit the number of users with access to the FTP server and prevent unauthorized access.


D.

Regularly backing up the software code stored in the FTP server and having a disaster recovery plan can help ensure the integrity of the software code.


Get Premium Cybersecurity-Architecture-and-Engineering Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.