Company XYZ has just purchased Company ABC through a new acquisition. A business decision
has been made to integrate the two company’s networks, application, and several basic services.
The initial integration of the two companies has specified the following requirements:
Company XYZ requires access to the web intranet, file, print, secure FTP server, and
authentication domain resources
Company XYZ is being on boarded into Company ABC’s authentication domain
Company XYZ is considered partially trusted
Company XYZ does not want performance issues when accessing ABC’s systems
Which of the following network security solutions will BEST meet the above requirements?
A.
Place a Company ABC managed firewall in Company XYZ’s hub site; then place Company
ABC’s file, print, authentication, and secure FTP servers in a zone off the firewall. Ensure that
Company ABC’s business partner firewalls are opened up for web intranet access and other
required services.
B.
Require Company XYZ to manage the router ACLs, controlling access to Company ABC
resources, but with Company ABC approving the change control to the ACLs. Open up Company
ABC’s business partner firewall to permit access to Company ABC’s file, print, secure FTP server,
authentication servers and web intranet access.
C.
Place no restrictions on internal network connectivity between Company XYZ and Company
ABC. Open up Company ABC’s business partner firewall to permit access to Company ABC’s file,
print, secure FTP server, authentication servers and web intranet access.
D.
Place file, print, secure FTP server and authentication domain servers at Company XYZ’s hub
site. Open up Company ABC’s business partner firewall to permit access to ABC’s web intranet
access and other required services.