During a security incident, the security operations team identified sustained network traffic from a malicious IP address: 10.1.4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization’s network. Which of the following fulfills this request?
dbrowndiver
Highly Voted 9 months, 2 weeks agoPukaSudu
Most Recent 11 months, 3 weeks agoSHADTECH123
12 months agoshady23
1 year agoMehsotopes
1 year agorjbb
1 year ago