Several users are reporting connectivity issues with their laptops. Upon further investigation, the network technician identifies that their laptops have been attacked from a specific IP address outside of the network. Which of the following would need to be configured to prevent any further attacks from that IP address?

A. Port security
B. IDS
C. Firewall rules
D. Switch VLAN assignments


Answer: C. Firewall rules

Computer Science & Information Technology

You might also like to view...

Which of the following will count down from 10 to 1 correctly?

a. for (int j = 10; j <= 1; j++) b. for (int j = 1; j <= 10; j++) c. for (int j = 10; j > 1; j--) d. for (int j = 10; j >= 1; j--)

Computer Science & Information Technology

Presentation software offers a variety of ____ that help you place titles, text, lists, graphs, and other elements.

A. slide designs B. slide layouts C. graphics D. formats

Computer Science & Information Technology

VRML is inserted into HTML documents using ________.

a) the EMBED element b) the OBJECT element c) the VRML element d) Microsoft Agent

Computer Science & Information Technology

The COUNT function is in the ________ category of the More Functions option in the Function Library group of the Formulas tab

A) Statistical B) Information C) Engineering D) Cube

Computer Science & Information Technology