An organization is reviewing its network security strategy to prevent unauthorized access to its sensitive data. Which of the following implementations aligns BEST with the principles of defense in depth to protect the network from various attack vectors?
Deploying a honeypot to divert attacks from production servers
Implementing network segmentation enforcement to create separated zones of access
Enforcing strong password complexity requirements for all user accounts
Enabling a client-to-site VPN for remote employee access