A security engineer is faced with competing requirements from the networking group and database administrators. The database administrators would like ten application servers on the same subnet for ease of administration, whereas the networking group would like to segment all applications from one another.Which of the following should the security administrator do to rectify this issue?
A. Recommend performing a security assessment on each application, and only segment the applications with the most vulnerability
B. Recommend classifying each application into like security groups and segmenting the groups from one another
C. Recommend segmenting each application, as it is the most secure approach
D. Recommend that only applications with minimal security features should be segmented to protect them
Answer: B. Recommend classifying each application into like security groups and segmenting the groups from one another
You might also like to view...
Match each item with a statement below.
A. The letter that is usually created in Word. B. Usually stored in a table, worksheet, or a database such as Access. C. Document that contains standard body text and a custom heading containing the name and address for one of many recipients. D. A third file consisting of multiple personalized letters. E. Placeholder in the main document to indicate where the custom information from the data source should appear.
The figure element is an HTML5 ?structure? tag. _________________________
Answer the following statement true (T) or false (F)