As a result of an acquisition, a new development team is being integrated into the company. The development team has BYOD laptops with IDEs installed, build servers, and code repositories that utilize SaaS. To have the team up and running effectively, a separate Internet connection has been procured. A stand up has identified the following additional requirements: 1. Reuse of the existing network infrastructure 2. Acceptable use policies to be enforced 3. Protection of sensitive files 4. Access to the corporate applications Which of the following solution components should be deployed to BEST meet the requirements? (Choose three.)
A) IPSec VPN
B) HIDS
C) Wireless controller
D) Rights management
E) SSL VPN
F) NAC
G) WAF
H) Load balancer
Correct Answer:
Verified
Q318: When implementing a penetration testing program, the
Q319: An analyst is investigating anomalous behavior on
Q320: A security researcher is gathering information about
Q321: Ann, a security administrator, is conducting an
Q322: An internal application has been developed to
Q324: Company leadership believes employees are experiencing an
Q325: A security analyst has been asked to
Q326: An engineer is reviewing the security architecture
Q327: An organization wants to arm its cybersecurity
Q328: Following a recent and very large corporate
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents