8. During your investigation of a security breach, you discover the corporate
fileserver is connected to a VLAN that is accessible to systems in the development
environment. This violates which security principle?
(A) VLAN management
(B) Least privilege
(C) Network separation
(D) Loop protection