In order to protect a network against unauthorized external connections to corporate systems, the information security manager should BEST implement:
A. a strong authentication.
B. IP antispoofing filtering.
C. network encryption protocol.
D. access lists of trusted devices.
A. a strong authentication.
B. IP antispoofing filtering.
C. network encryption protocol.
D. access lists of trusted devices.