An organization wants to control what types of network traffic are allowed to enter and leave its network and access its applications. Which security measure should the organization use?
D. Firewall rules.
Firewall rules are used to control the types of network traffic that are allowed to enter and leave a network. They can be configured to permit or block specific IP addresses, ports, and protocols, thereby controlling access to applications, services, and other network resources. Firewalls can be set up at various levels (e.g., perimeter, internal network, or cloud-based) to enforce these security policies.
Why the other options are incorrect:
A. 2-Step Verification: 2-Step Verification (also known as multi-factor authentication or MFA) is a security measure used to ensure that users are who they say they are before accessing systems or accounts. While it's crucial for securing user accounts, it does not control or manage network traffic or access to applications at the network level.
B. Privileged access: Privileged access refers to giving users elevated access rights or permissions within a system or application, often associated with administrative roles. While managing privileged access is important for ensuring that sensitive resources are protected, it does not specifically control network traffic entering or leaving the network.
C. Encryption keys: Encryption keys are used to secure data during transmission or while stored, ensuring data confidentiality and integrity. While encryption protects the data itself, it does not control the network traffic that enters or exits the system. Firewall rules are the appropriate measure for controlling traffic flow.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
joshnort
5 months agojoshnort
5 months agojoshnort
5 months ago