List of questions
Related questions
Question 40 - SY0-701 discussion
During a security incident, the security operations team identified sustained network traffic from a malicious IP address:
10.1.4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization's network. Which of the following fulfills this request?
A.
access-list inbound deny ig source 0.0.0.0/0 destination 10.1.4.9/32
B.
access-list inbound deny ig source 10.1.4.9/32 destination 0.0.0.0/0
C.
access-list inbound permit ig source 10.1.4.9/32 destination 0.0.0.0/0
D.
access-list inbound permit ig source 0.0.0.0/0 destination 10.1.4.9/32
Your answer:
0 comments
Sorted by
Leave a comment first