List of questions
Related questions
Question 51 - SY0-701 discussion
A systems administrator set up a perimeter firewall but continues to notice suspicious connections between internal endpoints. Which of the following should be set up in order to mitigate the threat posed by the suspicious activity?
A.
Host-based firewall
B.
Web application firewall
C.
Access control list
D.
Application allow list
Your answer:
0 comments
Sorted by
Leave a comment first