You work as the Network Administrator for a defense contractor. Your company works with
sensitive materials and all IT personnel have at least a secret level clearance. You are still
concerned that one individual could perhaps compromise the network (intentionally or
unintentionally) by setting up improper or unauthorized remote access. What is the best way to
avoid this problem?
A.
Implement separation of duties.
B.
Implement RBAC.
C.
Implement three way authentication.
D.
Implement least privileges.