During an investigation, a security analyst determines suspicious activity occurred during the night shift over the weekend. Further investigation reveals the activity was initiated from an internal IP going to an external website. Which of the following would be the MOST appropriate recommendation to prevent he activity from happening in the future?

A. An IPS signature modification for the specific IP addresses
B. An IDS signature modification for the specific IP addresses
C. A firewall rule that will block port 80 traffic
D. A firewall rule that will block traffic from the specific IP address

Answer: D. A firewall rule that will block traffic from the specific IP address

Computer Science & Information Technology

You might also like to view...

When pasting a range of cells, you need to select ONLY the cell in the upper right corner of the paste area

Indicate whether the statement is true or false

Computer Science & Information Technology

Word stores features like page numbering or margins in a document by means of the invisible:

A) Section Code marker. B) formatting marker. C) delimiter. D) hidden text.

Computer Science & Information Technology