Customers' credit card information was stolen from a popular video streaming company. A security consultant determined that the information was stolen, while in transit, from the gaming consoles of a particular vendor. Which of the following methods should the company consider to secure this data in the future?

Customers' credit card information was stolen from a popular video streaming company. A security consultant determined that the information was stolen, while in transit, from the gaming consoles of a particular vendor. Which of the following methods should the company consider to secure this data in the future?




A. Application firewalls
B. Manual updates
C. Firmware version control
D. Encrypted TCP wrappers


Answer: D


Learn More :

SY0-401

Learn More Multiple Choice Question :