Applying detailed instructions to manage the flow of network traffic at the edge of the network, including allowing or denying traffic…?

Applying detailed instructions to manage the flow of network traffic at the edge of the network, including allowing or denying traffic based on port, protocol, address, or direction is an implementation of which of the following?

Applying detailed instructions to manage the flow of network traffic at the edge of the network, including allowing or denying traffic based on port, protocol, address, or direction is an implementation of which of the following?

A.
Virtualization

B.
Port security

C.
IPSec

D.
Firewall rules



Leave a Reply 0

Your email address will not be published. Required fields are marked *