An administrator would like to implement a technology that requires no configuration on the client side and filters out specified port ranges. Which of the following would accomplish this?
A.
Host-based firewall
B.
Network-based IDS
C.
Network-based firewall
D.
Host-based proxy service