Company A permits visiting business partners from Company B to utilize Ethernet ports available in Company
A’s conference rooms. This access is provided to allow partners the ability to establish VPNs back to Company
B’s network. The security architect for Company A wants to ensure partners from Company B are able to gain direct Internet access from available ports only, while Company A employees can gain access to the Company
A internal network from those same ports. Which of the following can be employed to allow this?
A.
ACL
B.
SIEM
C.
MAC
D.
NAC
E.
SAML