Which three of these options are some of the best practices when you implement an effective firewall security policy? (choose three)
A.
position firewalls at a strategic inside locations to help mitigate nontechnical attacks
B.
configure logging to capture all events for forensic purposes
C.
use firewalls as a primary security defense; other security measures and devices shoulde be
D.
position firewalls at key security boundeeries
E.
deny all traffic by default and permit only necessary services
Explanation:
implemented to enhance your network security
I have the same idea. CDE