In order to protect a network against unauthorized external connections to corporate systems, the information security manager should BEST implement:

In order to protect a network against unauthorized external connections to corporate systems, the
information security manager should BEST implement:

In order to protect a network against unauthorized external connections to corporate systems, the
information security manager should BEST implement:

A.
a strong authentication.

B.
IP antispoofing filtering.

C.
network encryption protocol.

D.
access lists of trusted devices.

Explanation:

Strong authentication will provide adequate assurance on the identity of the users, while IP
antispoofing is aimed at the device rather than the user. Encryption protocol ensures data
confidentiality and authenticity while access lists of trusted devices are easily exploited by spoofed
identity of the clients.



Leave a Reply 0

Your email address will not be published. Required fields are marked *