You work as a network administrator at A2B Aviation. You have received instruction to start designing a method for the research intellectual property to remain confidential. The solution you are busy designing for A2B Aviation should meet security requirements.
What should you do?
A.
Communications between A2B-SR12, A2B-SR10, A2B-SR07, and A2B-SR01 should be required to use IPSec.
B.
A separate subnet for all servers should be created that contain research intellectual property.
C.
A2B-SR12 and A2B-SR07 should be placed on a separate virtual LAN from the internal network. Access to these virtual LAN segments should be granted to only the client computers that are used by authorized users.
D.
Client computers should be required to connect to research intellectual property through a SSL VPN.