Which of the following BEST describes this implementation?

Each server on a subnet is configured to only allow SSH access from the administrator’s
workstation. Which of the following BEST describes this implementation?

Each server on a subnet is configured to only allow SSH access from the administrator’s
workstation. Which of the following BEST describes this implementation?

A.
Host-based firewalls

B.
Network firewalls

C.
Network proxy

D.
Host intrusion prevention



Leave a Reply 0

Your email address will not be published. Required fields are marked *