You are implementing network access to a new business partner that will work with the development team on a new product. Which of the following would best mitigate risk associated with allowing this new partner access to the network?
a. Network segmentation
b. ACLs
c. VPN implementation
d. Log analysis
Answer: a. Network segmentation
Computer Science & Information Technology
You might also like to view...
A chart that is created in Word is stored in the Access application, yet the worksheet is saved to the Word document
Indicate whether the statement is true or false
Computer Science & Information Technology
Many systems, including MS-Windows, support the use of ____________, which are short sequences of characters that appear at the end of filenames and are preceded by a period.
a. filename extensions b. pragmatic identifiers c. binary indices d. run time signatures
Computer Science & Information Technology