The security administrator needs to manage traffic on a layer 3 device to support FTP from a new remote site. Which of the following would need to be implemented?
A. Implicit deny
B. VLAN management
C. Port security
D. Access control lists
Answer: D. Access control lists
Computer Science & Information Technology
You might also like to view...
Google Drive has word processor, spreadsheet, presentation, and database applications
Indicate whether the statement is true or false
Computer Science & Information Technology
By ________ the application, you are protecting the data and database structure from accidental or intentional modifications
A) restricting B) locking down C) limiting D) hiding
Computer Science & Information Technology
Methods are not algorithms.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The name of the last filter applied to a layer appears at the bottom of the Filter menu.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology