Company A permits visiting business partners from Company B to utilize Ethernet ports available in
Company A-s conference rooms. This access is provided to allow partners the ability to establish VPNs back to Company B-s network. The security architect for Company A wants to ensure partners from Company B are able to gain direct Internet access from ava
ilable ports only, while Company A employees can gain access to the Company A internal network from those same ports. Which of the following can be employed to allow this?
A. ACL
B. SIEM
C. MAC
D. NAC
E. SAML