Organizations should consider which of the following first before allowing external access to their LANs via the Internet?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
Before a LAN is connected to the Internet, you need to determine what the access controls mechanisms are to be used, this would include how you are going to authenticate individuals that may access your network externally through access control.
The following answers are incorrect: plan for implementing workstation locking mechanisms.
This is incorrect because locking the workstations have no impact on the LAN or Internet access.
plan for protecting the modem pool.
This is incorrect because protecting the modem pool has no impact on the LAN or Internet access, it just protects the modem.
plan for providing the user with his account usage information.
This is incorrect because the question asks what should be done first.
While important your primary concern should be focused on security.
When an organization considers allowing external access to their LANs via the Internet, there are several security considerations that should be taken into account to protect against unauthorized access, data theft, or other security threats.
Of the options provided, "D. plan for considering proper authentication options" should be the first consideration. Authentication is the process of verifying the identity of a user or system, and it is a critical component of any security strategy.
Without proper authentication, an organization risks allowing unauthorized users to access their network, potentially leading to data breaches, theft of sensitive information, and other security incidents. Therefore, an organization should plan for and implement appropriate authentication mechanisms, such as two-factor authentication, multi-factor authentication, or other forms of strong authentication.
Once authentication mechanisms are in place, an organization can consider other security measures, such as workstation locking mechanisms, protecting the modem pool, and providing users with their account usage information. Workstation locking mechanisms, such as passwords or biometric authentication, can help prevent unauthorized access to individual workstations. Protecting the modem pool can help prevent unauthorized access to the network via the organization's Internet connection. Providing users with their account usage information can help them monitor their activity and detect any suspicious activity.
In summary, while all of the options provided are important considerations for securing an organization's LANs, proper authentication options should be the first priority before allowing external access to the network via the Internet.