When a company is unable to deploy end-to-end encryption due to legacy systems, utilizing a virtual private network can act as an alternative measure to encrypt data communications. This approach offers an added layer of security by securing transmissions that would otherwise be unprotected within the organization's network.
The correct answer is 'True' because a virtual private network (VPN) can indeed serve as a compensating control, providing encryption for data in transit as a supplementary layer of security when end-to-end encryption on the internal network isn't a viable option. By implementing a VPN, an organization can protect sensitive data that is transmitted over the network, fulfilling the role of a compensating control and effectively mitigating the risk associated with the inability to implement direct encryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Virtual Private Network (VPN)?
Open an interactive chat with Bash
What is end-to-end encryption and why is it important?
Open an interactive chat with Bash
What are legacy systems and how do they affect security measures?