Which of the following mitigation techniques places devices in physically or logically separated networks and
leverages policies to limit the types of communications that are allowed?
A. Host-based firewalls
B. Access control list
C. Port security
D. Least privilege
leverages policies to limit the types of communications that are allowed?
A. Host-based firewalls
B. Access control list
C. Port security
D. Least privilege