The security administrator needs to manage traffic on a layer 3 device to support FTP from a new remote site. Which of the following would need to be implemented?

A. Implicit deny
B. VLAN management
C. Port security
D. Access control lists


Answer: D. Access control lists

Computer Science & Information Technology

You might also like to view...

Google Drive has word processor, spreadsheet, presentation, and database applications

Indicate whether the statement is true or false

Computer Science & Information Technology

By ________ the application, you are protecting the data and database structure from accidental or intentional modifications

A) restricting B) locking down C) limiting D) hiding

Computer Science & Information Technology

Methods are not algorithms.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The name of the last filter applied to a layer appears at the bottom of the Filter menu.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology