Which security operations management best practice should be followed to enable appropriate
network access for administrators?
A.
Provide full network access from dedicated network administration systems
B.
Configure the same management account on every network device
C.
Dedicate a separate physical or logical plane for management traffic
D.
Configure switches as terminal servers for secure device access