You are the leader of the security team at Certkiller Inc and you are working on mitigation trust exploitation attacks. How is trust exploitation attacks mitigated in the SAFE SMR midsize network design corporate Internet module?
A.
Mitigated by using restrictive trust model and private VLANs.
B.
Mitigated by using OS and IDS detection.
C.
Mitigated by using restrictive filtering and host IDS.
D.
Mitigated by using IDS at the host and network levels.
E.
Mitigated by using filtering at the ISP, edge router, and corporate firewall.
Explanation:
Trust exploitation-Restrictive trust model and private VLANs to limit trust-based attacks
Reference: Safe white papers;page 17
SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks