An organization does not have adequate resources to administer its large infrastructure. A security
administrator wishes to combine the security controls of some of the network devices in the organization. Which
of the following methods would BEST accomplish this goal?
Unified Threat Management
Virtual Private Network
Single sign on
When you combine a firewall with other abilities (intrusion prevention, antivirus, content filtering, etc.), what
used to be called an all-in-one appliance is now known as a unified threat management (UTM) system. The
advantages of combining everything into one include a reduced learning curve (you only have one product to
learn), a single vendor to deal with, and—typically—reduced complexity.