A security analyst receives a report indicating a system was compromised due to malware that was downloaded from the internet using TFTP. The analyst is instructed to block TFTP at the corporate firewall. Given the following portion of the current firewall rule set:
Which of the following rules should be added to accomplish this goal?
2Fish
Highly Voted 2 years, 4 months agoAdji91
2 years, 3 months agoLukers
Highly Voted 2 years, 3 months agoMeowson
2 years, 2 months agoskibby16
Most Recent 1 year, 9 months ago55wetip
1 year, 11 months agokill_chain
1 year, 12 months agoKashim
2 years, 4 months ago