Company A and Company B both supply contractual services to a fast paced and growing auto parts manufacturer with a small local Area Network (LAN) at its local site. Company A performs in- house billing and invoices services for the local auto parts manufactacturer. Company B provides in-house parts and widgets services for the local auto parts manufacturers. Which of the following is the BEST method to mitigate security risk within the environment?
A. Virtual Private Network
B. Role-Based access
C. Network segmentation
D. Public Key Infrastructure
Answer: C. Network segmentation
You might also like to view...
Answer the following statements true (T) or false (F)
Ext3 is a journaling version of Ext2 that has a built-in file recovery mechanism used after a crash.
A systems administrator wishes to improve security in a datacenter. The administrator wants to be alerted whenever a hard drive is removed from the server room. Which of the following security measures would BEST accomplish this?
A. RFID chips B. Security cameras C. Server and cabinet locks D. Mantrap E. Proximity reader
Which layer of the TCP/IP model processes requests from hosts to ensure that a connection is made to the appropriate port?
What will be an ideal response?
____ give you better control over the function and file size of an image, because they can be optimized to load individually.
a. Dithers b. Styles c. Slices d. Filters