An engineer is designing a network topology for a company that maintains a large on-premises private cloud. A
design requirement mandates internet-facing hosts to be partitioned off from the internal LAN and internal
server IP ranges. Which of the following defense strategies helps meet this requirement?
A. Implementing a screened subnet
B. Deploying a honeypot
C. Utilizing network access control
D. Enforcing a Zero Trust model
design requirement mandates internet-facing hosts to be partitioned off from the internal LAN and internal
server IP ranges. Which of the following defense strategies helps meet this requirement?
A. Implementing a screened subnet
B. Deploying a honeypot
C. Utilizing network access control
D. Enforcing a Zero Trust model