CompTIA Security+ SY0-601 – Question527

Which of the following mitigation techniques places devices in physically or logically separated networks and
leverages policies to limit the types of communications that are allowed?


A.
Host-based firewalls
B. Access control list
C. Port security
D. Least privilege

Correct Answer: A