How is unauthorized access mitigated in the SAFE SMR midsize network design corporate Internet module?

John the security administrator at Certkiller Inc. is working on the securing the network. How is unauthorized access mitigated in the SAFE SMR midsize network design corporate Internet module?

John the security administrator at Certkiller Inc. is working on the securing the network. How is unauthorized access mitigated in the SAFE SMR midsize network design corporate Internet module?

A.
Mitigated by CAR at the ISP edge and TCP setup controls at the firewall.

B.
Mitigated by filtering at the ISP, edge router, and corporate firewall.

C.
Mitigated by IDS at the host and network levels.

D.
Mitigated by OS and IDS detection.

E.
Mitigated by e-mail content filtering, HIDS, and host-based virus scanning.

F.
Mitigated by RFC 2827 and 1918 filtering at ISP edge and midsize network edge.

Explanation:

Unauthorized access-Mitigated through filtering at the ISP, edge router, and corporate firewall
Reference: Safe white papers;page 17
SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks



Leave a Reply 0

Your email address will not be published. Required fields are marked *