A security administrator is hardening a TrustedSolaris server that processes sensitive data.
The data owner has established the following security requirements: -> The data is for internal consumption only and shall not be distributed to outside individuals -> The systems administrator should not have access to the data processed by the server -> The integrity of the kernel image is maintained.
Which of the following host-based security controls BEST enforce the data owner's requirements? (Choose three.)
Click on the arrows to vote for the correct answer
A. B. C. D. E. F. G.CEF.