Company A and Company B both supply contractual services to a fast paced and growing auto parts manufacturer with a small local Area Network (LAN) at its local site. Company A performs in- house billing and invoices services for the local auto parts manufactacturer. Company B provides in-house parts and widgets services for the local auto parts manufacturers. Which of the following is the BEST method to mitigate security risk within the environment?

A. Virtual Private Network
B. Role-Based access
C. Network segmentation
D. Public Key Infrastructure


Answer: C. Network segmentation

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

Ext3 is a journaling version of Ext2 that has a built-in file recovery mechanism used after a crash.

Computer Science & Information Technology

A systems administrator wishes to improve security in a datacenter. The administrator wants to be alerted whenever a hard drive is removed from the server room. Which of the following security measures would BEST accomplish this?

A. RFID chips B. Security cameras C. Server and cabinet locks D. Mantrap E. Proximity reader

Computer Science & Information Technology

Which layer of the TCP/IP model processes requests from hosts to ensure that a connection is made to the appropriate port?

What will be an ideal response?

Computer Science & Information Technology

____ give you better control over the function and file size of an image, because they can be optimized to load individually.

a. Dithers b. Styles c. Slices d. Filters

Computer Science & Information Technology