PdfPrep.com

What can ISPs use to implement inbound traffic filtering as a control to identify IP packets transmitted from unauthorized sources?

What can ISPs use to implement inbound traffic filtering as a control to identify IP packets transmitted from unauthorized sources?
A . OSI Layer 2 switches with packet filtering enabled
B . Virtual Private Networks
C . Access Control Lists (ACL)
D . Point-to-Point Tunneling Protocol

Answer: C

Explanation:

ISPs can use access control lists to implement inbound traffic filtering as a control to identify IP packets transmitted from unauthorized sources.

Exit mobile version