Malicious traffic from an internal network has been detected on an unauthorized port on an application server.Which of the following network-based security controls should the engineer consider implementing?

A. ACLs
B. HIPS
C. NAT
D. MAC filtering


Answer: A. ACLs

Computer Science & Information Technology

You might also like to view...

Which of the following is not a valid StringBuilder constructor?

Given the following declarations: ``` StringBuilder buf; StringBuilder buf2 = new StringBuilder(); String c = new String("test"); ``` a. buf = new StringBuilder(); b. buf = new StringBuilder(buf2, 32); c. buf = new StringBuilder(32); d. buf = new StringBuilder(c);

Computer Science & Information Technology

A destination from one network to another used by routing tables.

What will be an ideal response?

Computer Science & Information Technology

__________ begins a single-line comment.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ____________________ connection is a special kind of data link connection used to supportĀ various types of real-time applications.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology