PdfPrep.com

Which of the follow is the BEST configuration for implementing the new security policy?

A company recently changed its security policy to allow access to only pre-approved websites and setup to occur without any end-user configuration.

Which of the follow is the BEST configuration for implementing the new security policy?
A . Install and configure a transparent proxy.
B . Install an ACL router and an agentless NA
D . Install a Layer 3 switch with loop prevention and a MAC filtering access point.
E . Install a SIEM with automated triggers and a heuristic NID

Answer: A

Exit mobile version