Enhance your CompTIA CASP+ exam readiness with our comprehensive quizzes. Sharpen your skills with detailed flashcards and multiple choice questions, each with hints and in-depth explanations. Prepare effectively for this challenging exam!

Practice this question and more.


What is the best option for a secure computing solution to store security audit logs and execute security functions?

  1. Windows Server with encryption

  2. Solaris 10 with trusted extensions

  3. Linux without special configurations

  4. Mac OS X with security updates

The correct answer is: Solaris 10 with trusted extensions

Choosing Solaris 10 with trusted extensions as the best option for a secure computing solution for storing security audit logs and executing security functions is justified by several key characteristics of this operating system. Solaris 10, particularly when enhanced with trusted extensions, provides an advanced security framework that focuses on enforcing strict access controls and maintaining data confidentiality. Trusted extensions allow for mandatory access controls, which are extremely beneficial in protecting sensitive data, such as security audit logs. This approach is critical for compliance with various regulations and standards that mandate rigorous logging and auditing processes. Additionally, Solaris's security features include the ability to label data and apply different security levels, which enhances the management of user permissions and ensures that only authorized users can access sensitive information. This is essential for any system handling security logs, thereby maintaining the integrity and confidentiality of the audit data over time. While other operating systems like Windows Server and Mac OS X provide certain security features and can be configured to meet various security needs, Solaris's specific emphasis on trusted extensions and its robust architecture designed for high-security environments make it a more suitable choice for executing security functions and ensuring secure storage of audit logs. In contrast, Linux without special configurations may lack the built-in security features that Solaris offers, potentially requiring substantial manual configuration to