An organization does not have adequate resources to administer its large infrastructure. A
security administrator wishes to combine the security controls of some of the network
devices in the organization. Which of the following methods would BEST accomplish this
goal?
A.
Unified Threat Management
B.
Virtual Private Network
C.
Single sign on
D.
Role-based management