The policy should allow the desktop users to work as freely as possible, but at the same time makes it hard to attack the remote users’ desktop. Which of the following points must you consider when defining these plans? Select all the correct answers.
A.
Allow only POP3, IMAP and HTTP and block all the rest
B.
Implement outbound policy to use rules in order to block specific problematic services and allow the rest
C.
Outbound connections to the encryption domain of the organization must always be encrypted, even if the outbound rule for the service specifies “accept”
D.
It should be borne in mind that the implied rules may allow or block services which were not explicitly handled in previous rules
E.
You should not explicitly allow any service to be opened to the SecureClient