You are tasked with securing a small network for a client in which the following requirements must be met:
• If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered.
• The private trusted network should not be accessible from the public untrusted network.
• If attacks are coming from the external network, the system should detect and prevent malicious activity.
• All incoming and outgoing email should be scanned for malware.
Which of the following would best meet the requirements of the client?
A. Implement a firewall.
B. Implement an IPS.
C. Implement a UTM appliance.
D. Implement identity-based ACLs.
E. Implement an IDS.
Answer: C
Computer Science & Information Technology
You might also like to view...
To synchronize iPad data such as contacts, calendars, and so on, PC users need to use which of the following?
a. iTunes for Windows. b. Windows 7 or later. c. Windows Data Manager. d. You cannot synchronize data between an iPad and a PC.
Computer Science & Information Technology
Which mode argument, used with an ifstream object, is used to open a file for input purposes?
A. ios::in B. open::input C. ios::app D. open::in
Computer Science & Information Technology