How are trust exploitation attacks mitigated in the SAFE SMR small network corporate Internet module?
A.
RFC 2827 and 1918 filtering at ISP edge and local firewall.
B.
Switched infrastructure and HIDS.
C.
Protocol filtering.
D.
Restrictive trust model and private VLANs.
E.
Restrictive filtering and HIDS.
Explanation:
Trust exploitation-Restrictive trust model private VLANs to limit trust-based attacks
Reference: SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks Page 11