One of the findings of risk assessment is that many of the servers on the data center subnet contain data
that is in scope for PCI compliance, Everyone in the company has access to these servers, regardless of
their job function. Which of the following should the administrator do?

A.
Segment the network
B.
Use 802.1X
C.
Deploy a proxy sever
D.
Configure ACLs
E.
Write an acceptable use policy