The security administrator needs to make a change in the network to accommodate a new remote location. The
new location will be connected by a serial interface, off the main router, through a commercial circuit. This
remote site will also have traffic completely separated from all other traffic. Which of the following design
elements will need to be implemented to accommodate the new location?
A vulnerability assessment was conducted against a network. One of the findings indicated an out-dated
version of software. This is an example of weak: