A network administrator is tasked to block all outbound SSH connections on the default port from a network subnet of 10.152.8.0/21 on a Linux based firewall. Which of the following rule sets would accomplish this task?
A. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j REJECT
B. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j REJECT
C. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j ACCEPT
D. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j ACCEPT
Answer: A. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j REJECT
You might also like to view...
The process of instructing the computer to solve specific problems is called___________ .
Fill in the blank(s) with the appropriate word(s).
Assume that programs and data may be shuttled from any level to any other level under the operating system’s control.The time it takes to transfer items between two particular levels is dependent upon the speed of the lowest (and slowest) level involved in the transfer.Why might the operating system choose to shuttle a program from cache directly to secondary memory, thus bypassing primary memory?
What will be an ideal response?
In Excel, you can reduce the total width of a(n) ________ by adjusting the column widths
Fill in the blank(s) with correct word
List methods to protect computers, mobile devices, and networks from attacks.
What will be an ideal response?