During a recent audit of servers, a company discovered that a network administrator, who required remote access, had deployed an unauthorized remote access
application that communicated over common ports already allowed through the firewall. A network scan showed that this remote access application had already
been installed on one third of the servers in the company. Which of
the following is the MOST appropriate action that the company should take to provide a more appropriate solution?
A.
Implement an IPS to block the application on the network
B.
Implement the remote application out to the rest of the servers
C.
Implement SSL VPN with SAML standards for federation
D.
Implement an ACL on the firewall with NAT for remote access