The "NSA Methodology for Adversary Obstruction" outlines steps to segregate networks and functions. One of these methods is DMZ isolation. By ensuring that the DMZ is properly segregated both through physical and _______ network architecture and admin/user accounts, a network owner can greatly decrease the external attack surface.