Which of the following will be the MOST effective solution in limiting access based on this requirement?
Which of the following could be used to help mitigate the risk of these machines becoming compromised?