Youare a network designer and have been asked to consult with your server operations team
to further enhance the security of the network. The operations team provides you with these
details about the network:
A pool of servers is accessed by numerous data centers and
remote sites. The servers are accessed via a cluster of firewalls.
The firewalls are configured properly and are not dropping traffic.
The firewalls occasionally cause asymmetric routing of traffic
within the server data center.
Which technology would you recommend to enhance security by limiting traffic that could
originate from a hacker compromising a workstation and redirecting flows at the servers?
A.
Access control lists to limit sources of traffic that exits the server-facing interface of the
firewall cluster
B.
Poison certain subnets by adding static routes to Null0 on the server farm core switches.
C.
Unicast Reverse Path Forwarding in strict mode
D.
Unicast Reverse Path Forwarding in loose mode