Which technology would you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?

You are a network designer and have been asked to consult with your server operations team to
further enhance the security of the network. The operations team provides you with these details
about the network:
A pool of servers is accessed by numerous data centers and remote sites.
The servers are accessed via a cluster of firewalls.
The firewalls are configured properly and are not dropping traffic.
The firewalls occasionally cause asymmetric routing of traffic within the server data center.
Which technology would you recommend to enhance security by limiting traffic that could originate
from a hacker compromising a workstation and redirecting flows at the servers?

You are a network designer and have been asked to consult with your server operations team to
further enhance the security of the network. The operations team provides you with these details
about the network:
A pool of servers is accessed by numerous data centers and remote sites.
The servers are accessed via a cluster of firewalls.
The firewalls are configured properly and are not dropping traffic.
The firewalls occasionally cause asymmetric routing of traffic within the server data center.
Which technology would you recommend to enhance security by limiting traffic that could originate
from a hacker compromising a workstation and redirecting flows at the servers?

A.
Access control lists to limit sources of traffic that exits the server-facing interface of the firewall
cluster

B.
Poison certain subnets by adding static routes to Null0 on the server farm core switches.

C.
Unicast Reverse Path Forwarding in strict mode

D.
Unicast Reverse Path Forwarding in loose mode



Leave a Reply 0

Your email address will not be published. Required fields are marked *