Which of the following techniques can be used to manage this?

An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.
Which of the following techniques can be used to manage this?

An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.
Which of the following techniques can be used to manage this?

A.
PAT

B.
ACLs

C.
Subnet masking

D.
Port blocking



Leave a Reply 0

Your email address will not be published. Required fields are marked *