125k views
2 votes
A global banking institution instructs its cybersecurity team to minimize the network's vulnerability to cyber threats. The team has divided the network into secure segments, initiated port security protocols, and physically segregated key servers. The team now wishes to manage the flow of traffic between the security segments to reduce the threat of attack. What approach should the cybersecurity team adopt?

A) Firewall implementation
B) Load balancing
C) Virtual Private Network (VPN)
D) Intrusion Detection System (IDS)
E) Public Key Infrastructure (PKI)

1 Answer

3 votes

Final answer:

The cybersecurity team should implement a firewall to control the flow of traffic between security segments, enhancing network security. Option A is correct.

Step-by-step explanation:

The approach that the cybersecurity team should adopt to manage the flow of traffic between the security segments to reduce the threat of attack is Firewall implementation. A firewall acts as a barrier between trusted internal networks and untrusted external networks such as the internet.

They can be configured to control the flow of traffic based on an established set of rules, ensuring that only authorized traffic can pass between segments, thus improving security.

This differs from the other options, such as Load balancing, which distributes network traffic across several servers to ensure no single server is overwhelmed, Virtual Private Network (VPN), which extends a private network across a public network, allowing users to send and receive data as if their computing devices were directly connected to the private network, Intrusion Detection System (IDS), which monitors a network for malicious activities or policy violations, and Public Key Infrastructure (PKI), which manages encryption and digital signature services through the use of public and private cryptographic keys.

User Sonic Soul
by
8.0k points