A security engineer is faced with competing requirements from the networking group and database administrators. The database administrators would like ten application servers on the same subnet for ease of administration, whereas the networking group would like to segment all applications from one another.Which of the following should the security administrator do to rectify this issue?

A. Recommend performing a security assessment on each application, and only segment the applications with the most vulnerability
B. Recommend classifying each application into like security groups and segmenting the groups from one another
C. Recommend segmenting each application, as it is the most secure approach
D. Recommend that only applications with minimal security features should be segmented to protect them

Answer: B. Recommend classifying each application into like security groups and segmenting the groups from one another

Computer Science & Information Technology

You might also like to view...

Match each item with a statement below.

A. The letter that is usually created in Word. B. Usually stored in a table, worksheet, or a database such as Access. C. Document that contains standard body text and a custom heading containing the name and address for one of many recipients. D. A third file consisting of multiple personalized letters. E. Placeholder in the main document to indicate where the custom information from the data source should appear.

Computer Science & Information Technology

The figure element is an HTML5 ?structure? tag. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology