A security administrator suspects that an increase in the amount of TFTP traffic on the network is
due to unauthorized file transfers, and wants to configure a firewall to block all TFTP traffic. Which
of the following would accomplish this task?
A.
Deny TCP port 68
B.
Deny TCP port 69
C.
Deny UDP port 68
D.
Deny UDP port 69