Malicious traffic from an internal network has been detected on an unauthorized port on an application server.
Which of the following network-based security controls should the engineer consider implementing?
A.
ACLs
B.
HIPS
C.
NAT
D.
MAC filtering
Explanation:
ExplanationExplanation/Reference: