Your company is merging with a smaller company, and the two networks will be joined. What information should be the first thing identified when developing the interconnection policy?
A. malware packages
B. the data types that need to flow between the companies
C. the IP addressing
D. the encryption protocol
B
Explanation: Identifying the necessary data flows between the companies could yield several benefits. They could filter traffic to only allow the necessary data flows, minimizing the attack surface or they could use this information to identify traffic that should not be there. Finally by identifying the necessary data flows, specific security plans can be made addressing attack types focusing on those traffic types.
You might also like to view...
Windows passwords are stored in a hash file in one of the system diretories
Indicate whether the statement is true or false.
Explain why computing the proximity between two attributes is often simpler than computing the similarity between two objects.
What will be an ideal response?