You are implementing network access to a new business partner that will work with the development team on a new product. Which of the following would best mitigate risk associated with allowing this new partner access to the network?

a. Network segmentation
b. ACLs
c. VPN implementation
d. Log analysis

Answer: a. Network segmentation

Computer Science & Information Technology

You might also like to view...

A chart that is created in Word is stored in the Access application, yet the worksheet is saved to the Word document

Indicate whether the statement is true or false

Computer Science & Information Technology

Many systems, including MS-Windows, support the use of ____________, which are short sequences of characters that appear at the end of filenames and are preceded by a period.

a. filename extensions b. pragmatic identifiers c. binary indices d. run time signatures

Computer Science & Information Technology