A manufacturing company has decided to add a website to enhance sales. The web servers in the
E-Commerce module must be accessible without compromising network security. Which two
design recommendations can be made to meet these requirements? (Choose two.)
A.
Use private and public key encryption.
B.
Move the E-Commerce servers to the WAN module.
C.
Use intrusion detection on the E-Commerce server farm.
D.
Limit the number of incoming connections to the E-Commerce module.
E.
Place E-Commerce servers and application servers on isolated LANs (DMZs).