A security engineer is faced with competing requirements from the networking group and database administrators. The database administrators would like ten application servers on the same subnet for ease of administration, whereas the networking group would like to segment all applications from one another.Which of the following should the security administrator do to rectify this issue?

A. Recommend performing a security assessment on each application, and only segment the applications with the most vulnerability
B. Recommend classifying each application into like security groups and segmenting the groups from one another
C. Recommend segmenting each application, as it is the most secure approach
D. Recommend that only applications with minimal security features should be segmented to protect them


Answer: B. Recommend classifying each application into like security groups and segmenting the groups from one another

Computer Science & Information Technology

You might also like to view...

What is the value returned when the integer 5 is the argument to the factorial method?

(a) 15 (b) 50 (c) 100 (d) 120

Computer Science & Information Technology

All Web browsers offer a way of saving frequently visited sites and they all consistently reference those by calling them "Favorites."

Indicate whether the statement is true or false

Computer Science & Information Technology

Besides providing accuracy and efficiency, what are the other purpose of coding ?

What will be an ideal response?

Computer Science & Information Technology

If two variables in different modules happen to have the same name, they are stored in different memory locations, and the statements affecting one do not affect the other.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology