ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 428 - SY0-601 discussion

Report
Export

During a security incident the security operations team identified sustained network traffic from a malicious IP address: 10.1.4.9 A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization's network. Which of the following fulfills this request?

A.
access-list inbound deny ip source 0.0.0.0/0 destination 10.1.4.9/32
Answers
A.
access-list inbound deny ip source 0.0.0.0/0 destination 10.1.4.9/32
B.
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
Answers
B.
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
C.
access-list inbound permit ip source 10.1.4.9/32 destination 0.0.0.0/0
Answers
C.
access-list inbound permit ip source 10.1.4.9/32 destination 0.0.0.0/0
D.
access-list inbound permit ip source 0.0.0.0/0 destination 10.1.4.9/32
Answers
D.
access-list inbound permit ip source 0.0.0.0/0 destination 10.1.4.9/32
Suggested answer: B

Explanation:

This command creates an inbound access list that denies any IP traffic from the source IP address of 10.1.4.9/32 to any destination IP address (0.0.0.0/0). It blocks the originating source of malicious traffic from accessing the organization's network.

asked 02/10/2024
saharat pinsaran
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first