During a recent audit of servers, a company discovered that a network administrator, who required remote
access, had deployed an unauthorized remote access application that communicated over common ports
already allowed through the firewall. A network scan showed that this remote access application had already
been installed on one third of the servers in the company. Which of the following is the MOST appropriate
action that the company should take to provide a more appropriate solution?
A.
Implement an IPS to block the application on the network
B.
Implement the remote application out to the rest of the servers
C.
Implement SSL VPN with SAML standards for federation
D.
Implement an ACL on the firewall with NAT for remote access