Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network.
Mark has retained his services to perform a security assessment of the company’s network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter rewall, but he does not know if that is enough. He wants toreview the situation and make some reliable recommendations so that he can protect the data over company’s network.
Which of the following will Mark use to inspect network information on the basis of source and destination address?
A.
Stateless packet inspection
B.
Tricky packet inspection
C.
Stateful packet inspection
D.
Reaction based packet inspection