Malicious traffic from an internal network has been detected on an unauthorized port on an application server.Which of the following network-based security controls should the engineer consider implementing?
A. ACLs
B. HIPS
C. NAT
D. MAC filtering
Answer: A. ACLs
You might also like to view...
Which of the following is not a valid StringBuilder constructor?
Given the following declarations: ``` StringBuilder buf; StringBuilder buf2 = new StringBuilder(); String c = new String("test"); ``` a. buf = new StringBuilder(); b. buf = new StringBuilder(buf2, 32); c. buf = new StringBuilder(32); d. buf = new StringBuilder(c);
A destination from one network to another used by routing tables.
What will be an ideal response?
__________ begins a single-line comment.
Fill in the blank(s) with the appropriate word(s).
A(n) ____________________ connection is a special kind of data link connection used to supportĀ various types of real-time applications.?
Fill in the blank(s) with the appropriate word(s).