Which of the following would need to be configured to prevent any further attacks from that IP address?

Several users are reporting connectivity issues with their laptops. Upon further investigation, the network
technician identifies that their laptops have been attacked from a specific IP address outside of the network.
Which of the following would need to be configured to prevent any further attacks from that IP address?

Several users are reporting connectivity issues with their laptops. Upon further investigation, the network
technician identifies that their laptops have been attacked from a specific IP address outside of the network.
Which of the following would need to be configured to prevent any further attacks from that IP address?

A.
Port security

B.
IDS

C.
Firewall rules

D.
Switch VLAN assignments



Leave a Reply 1

Your email address will not be published. Required fields are marked *

19 − 16 =


Shirley Mathew

Shirley Mathew

IDS only detects attacks

switch VLAN assignments/ports- these ports are referred to as access ports and provide a connection for end users.

port security- with dynamically learned and static MAC addresses to restrict a port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic into the port.

firewall rules- by restricting traffic can prevent future attacks