Each server on a subnet is configured to only allow SSH access from the administrator’s
workstation. Which of the following BEST describes this implementation?
A.
Host-based firewalls
B.
Network firewalls
C.
Network proxy
D.
Host intrusion prevention