An organization is considering the use of a thin client architecture as it moves to a cloud-hosted environment. A security analyst is asked to provide thoughts on the security advantages of using thin clients and virtual workstations. Which of the following are security advantages of the use of this combination of thin clients and virtual workstations?
A) Malicious insiders will not have the opportunity to tamper with data at rest and affect the integrity of the system.
B) Thin client workstations require much less security because they lack storage and peripherals that can be easily compromised, and the virtual workstations are protected in the cloud where security is outsourced.
C) All thin clients use TPM for core protection, and virtual workstations use vTPM for core protection with both equally ensuring a greater security advantage for a cloud-hosted environment.
D) Malicious users will have reduced opportunities for data extractions from their physical thin client workstations, this reducing the effectiveness of local attacks.
Correct Answer:
Verified
Q195: A security technician is incorporating the following
Q196: A breach was caused by an insider
Q197: Click on the exhibit buttons to view
Q198: A consultant is hired to perform a
Q199: A security engineer is embedded with a
Q201: A company has created a policy to
Q202: A security engineer is attempting to increase
Q203: The Chief Executive Officer (CEO) of a
Q204: An organization, which handles large volumes of
Q205: A company is not familiar with the
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents