In an organization that has undergone an expansion through an acquisition, which of the following would BEST secure the enterprise network?
A. Business or role-based segmentation
B. Using security groups
C. Log analysis of system access
D. Encryption of data traversing networks.
A. Business or role-based segmentation
B. Using security groups
C. Log analysis of system access
D. Encryption of data traversing networks.