Which of the following would be the BEST design choice when segmenting a network to ensure that a company's highly sensitive research and development data has stringent access control measures and dedicated surveillance mechanisms?
Deploying an Isolated Security Zone specifically for the research and development data, with rigorous access controls and monitoring.
Assigning the research and development servers to an Internal Zone used by the majority of the internal corporate services.
Configuring a Public Security Zone with selective access permissions to support the necessary connectivity.
Developing a perimeter network tailored for devices that must be accessible from both internal and external networks.