A company implements an SMTP server on their firewall. This implementation would violate which
of the following security principles?
A.
Use a device as intended
B.
Keep the solution simple
C.
Address internal threats
D.
Create an in-depth defense
A company implements an SMTP server on their firewall. This implementation would violate which
of the following security principles?
A company implements an SMTP server on their firewall. This implementation would violate which
of the following security principles?
A.
Use a device as intended
B.
Keep the solution simple
C.
Address internal threats
D.
Create an in-depth defense