A cybersecurity analyst needs to rearchitect the network using a firewall and a VPN server to achieve the highest level of security. To BEST complete this task, the analyst should place the:
A. firewall behind the VPN server.
B. VPN server parallel to the firewall
C. VPN server behind the firewall.
D. VPN on the firewall.
A. firewall behind the VPN server.
B. VPN server parallel to the firewall
C. VPN server behind the firewall.
D. VPN on the firewall.