Several users are reporting connectivity issues with their laptops. Upon further investigation, the
network technician identifies that their laptops have been attacked from a specific IP address
outside of the network. Which of the following would need to be configured to prevent any further
attacks from that IP address?
A.
Port security
B.
IDS
C.
Firewall rules
D.
Switch VLAN assignments
Firewall is the middle man between the internet and the private network.