A company is developing a new secure technology and requires computers being used for development to be isolated. Which of the following should be implemented to provide the MOST secure environment?

A. A perimeter firewall and IDS
B. An air gapped computer network
C. A honeypot residing in a DMZ
D. An ad hoc network with NAT
E. A bastion host

Answer: B. An air gapped computer network

Computer Science & Information Technology

You might also like to view...

Pressing Ctrl + Home moves the insertion point to ________

A) the beginning of the document B) the beginning of the current line C) the end of the current line D) the end of the document

Computer Science & Information Technology

Which of the following BEST describes the definition of DHCP?

A. DHCP is utilized to dynamically lease IP addresses to hosts. B. DHCP is utilized to statically lease IP address to hosts. C. DHCP is utilized to permanently lease IP address dynamically to hosts. D. DHCP is utilized to permanently lease IP address statically to hosts.

Computer Science & Information Technology