An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.
Which of the following techniques can be used to manage this?
A.
PAT
B.
ACLs
C.
Subnet masking
D.
Port blocking
An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.
Which of the following techniques can be used to manage this?
An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.
Which of the following techniques can be used to manage this?
A.
PAT
B.
ACLs
C.
Subnet masking
D.
Port blocking