Several high-level employees have recently requested remote access to corporate email and shared drives. Your company has never offered remote access. However, the company wants to improve productivity. Rapidly responding to customer demands means staff now requires remote access. Which of the following controls will BEST protect the corporate network?
A. Plan and develop security policies based on the assumption that external environments have active hostile threats.
B. Implement a DLP program to log data accessed by users connecting via remote access.
C. Secure remote access systems to ensure shared drives are read only and access is provided through an SSL portal.
D. Implement a VLAN to allow users to remotely access internal resources.
A
Explanation: The best control to protect the corporate network is to plan and develop security policies based on the assumption that external environments have active hostile threats.
None of the other options are correct. DLP will only log data that has been accessed and will not protect all that the organization needs to.
Securing remote access systems through an SSL portal will not provide all the access requested.
Implementing a virtual LAN (VLAN) will not provide all the access requested. VLANS are configured using switches and allow resources to be on an isolated VLAN.
You might also like to view...
The C++ ____ operator releases a block of bytes reserved previously.
a. free b. delete c. return d. dealloc
Your supervisor has created a spreadsheet and a chart is included in the workbook. Your supervisor thinks the chart legend is too large, how should you fix the chart?
What will be an ideal response?
Which of the following kinds of access refers to reading or writing data consecutively?
A. direct B. random C. sequential D. indexed
To define the distance between the edges of each cell in a table use the ________ attribute.
a. cellpad b. cellpadding c. cellspacing d. cellborder.