design requirement mandates internet-facing hosts to be partitioned off from the internal LAN and internal
server IP ranges. Which of the following defense strategies helps meet this requirement?
A. Implementing a screened subnet
B. Deploying a honeypot
C. Utilizing network access control
D. Enforcing a Zero Trust model