An organization does not have adequate resources to administer its large infrastructure. A security
administrator wishes to integrate the security controls of some of the network devices in the
organization. Which of the following methods would BEST accomplish this goal?

A.
Unified Threat Management
B.
Virtual Private Network
C.
Single sign on
D.
Role-based management
Explanation:
Unified Threat Management (UTM) is, basically, the combination of a firewall with other abilities. These
abilities include intrusion prevention, antivirus, content filtering, etc. Advantages of combining everything
into one:
You only have one product to learn.
You only have to deal with a single vendor.
IT provides reduced complexity.
Incorrect Answers:
B: Virtual Private Networks are for connecting LANs together across the Internet or other public
networks.
C: Single sign on allows users to access all of the resources on the network and browse multiple
directories once they have been authenticated.
D: Role-based management governs access based on a user’
Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,
2014, pp. 103, 119, 149, 152
This Q#56 is a repeat of Q#55 above.
0
0