A company is developing a new secure technology and requires computers being used for development to be isolated. Which of the following should be implemented to provide the MOST secure environment?
A. A perimeter firewall and IDS
B. An air gapped computer network
C. A honeypot residing in a DMZ
D. An ad hoc network with NAT
E. A bastion host
Answer: B. An air gapped computer network
Computer Science & Information Technology
You might also like to view...
Pressing Ctrl + Home moves the insertion point to ________
A) the beginning of the document B) the beginning of the current line C) the end of the current line D) the end of the document
Computer Science & Information Technology
Which of the following BEST describes the definition of DHCP?
A. DHCP is utilized to dynamically lease IP addresses to hosts. B. DHCP is utilized to statically lease IP address to hosts. C. DHCP is utilized to permanently lease IP address dynamically to hosts. D. DHCP is utilized to permanently lease IP address statically to hosts.
Computer Science & Information Technology