PdfPrep.com

Which of the following BEST describes the process which weakened the security posture of the enclave?

An existing enterprise architecture included an enclave where sensitive research and development work was conducted. This network enclave also served as a storage location for proprietary corporate data and records. The initial security architect chose to protect the enclave by restricting access to a single physical port on a firewall. All downstream network devices were isolated from the rest of the network and communicated solely through the single 100mbps firewall port. Over time, researchers connected devices on the protected enclave directly to external resources and corporate data stores. Mobile and wireless devices were also added to the enclave to support high speed data research.

Which of the following BEST describes the process which weakened the security posture of the enclave?
A . Emerging business requirements led to the de-perimiterization of the network.
B . Emerging security threats rendered the existing architecture obsolete.
C . The single firewall port was oversaturated with network packets.
D . The shrinking of an overall attack surface due to the additional access.

Answer: A

Exit mobile version