What procedure should be deployed to protect the network against lateral movement?
- Database backups
- VPNs
- Strong passwords for user accounts
- VLANs
Explanation & Hint: Lateral movement involves scanning a network for other systems, exploiting vulnerabilities in other systems, compromising credentials, and collecting sensitive information for exfiltration. Lateral movement is possible if an organization does not segment the network properly. The organization might have deployed virtual or physical firewalls, VLANs, or access control policies for segmentation. |