An organization does not have adequate resources to administer its large infrastructure. A security
administrator wishes to integrate the security controls of some of the network devices in the
organization. Which of the following methods would BEST accomplish this goal?
A.
Unified Threat Management
B.
Virtual Private Network
C.
Single sign on
D.
Role-based management