A company is developing a new secure technology and requires computers being used for development to be isolated.
Which of the following should be implemented to provide the MOST secure environment?
A.
A perimeter firewall and IDS
B.
An air gapped computer network
C.
A honeypot residing in a DMZ
D.
An ad hoc network with NAT
E.
A bastion host