To add an extra layer of remote access control to a critical online database, using a proxy server
combined with a VPN is the most effective method.
Proxy Server: Acts as an intermediary, filtering and logging traffic.
VPN: Ensures secure, encrypted connections from remote users.
Layered Security: Integrating both mechanisms protects the database by restricting direct public
access and encrypting data in transit.
Benefit: Even if credentials are compromised, attackers would still need VPN access.
Incorrect Options:
A . Incremental backups: This relates to data recovery, not access control.
C . Implementation of group rights: This is part of internal access control but does not add a remote
protection layer.
D . Encryption of data at rest: Protects stored data but does not enhance remote access security.
Exact Extract from CCOA Official Review Manual, 1st Edition:
Refer to Chapter 4, Section "Remote Access Security," Subsection "Securing Remote Access with
VPNs and Proxies" - VPNs combined with proxies are recommended for robust remote access control.