A company is developing a new secure technology and requires computers being used for development to be isolated.
Which of the following should be implemented to provide the MOST secure environment?
A . A perimeter firewall and IDS
B . An air gapped computer network
C . A honeypot residing in a DMZ
D . An ad hoc network with NAT
E . A bastion host
Answer: B