Several users are reporting connectivity issues with their laptops. Upon further investigation, the network technician identifies that their laptops have been attacked from a specific IP address outside of the network. Which of the following would need to be configured to prevent any further attacks from that IP address?
A. Port security
B. IDS
C. Firewall rules
D. Switch VLAN assignments
Answer: C. Firewall rules
You might also like to view...
Which of the following will count down from 10 to 1 correctly?
a. for (int j = 10; j <= 1; j++) b. for (int j = 1; j <= 10; j++) c. for (int j = 10; j > 1; j--) d. for (int j = 10; j >= 1; j--)
Presentation software offers a variety of ____ that help you place titles, text, lists, graphs, and other elements.
A. slide designs B. slide layouts C. graphics D. formats
VRML is inserted into HTML documents using ________.
a) the EMBED element b) the OBJECT element c) the VRML element d) Microsoft Agent
The COUNT function is in the ________ category of the More Functions option in the Function Library group of the Formulas tab
A) Statistical B) Information C) Engineering D) Cube