Which technology would you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?

Posted by: Pdfprep Category: 352-001 Tags: , ,

You are a network designer and have been asked to consult with your server operations team to further enhance the security of the network. The operations team provides you with these details about the network:

A pool of servers is accessed by numerous data centers and remote sites.

The servers are accessed via a cluster of firewalls.

The firewalls are configured properly and are not dropping traffic.

The firewalls occasionally cause asymmetric routing of traffic within the server data center.

Which technology would you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?
A . Access control lists to limit sources of traffic that exits the server-facing interface of the firewall cluster
B . Poison certain subnets by adding static routes to Null0 on the server farm core switches.
C . Unicast Reverse Path Forwarding in strict mode
D . Unicast Reverse Path Forwarding in loose mode

Answer: D

Leave a Reply

Your email address will not be published.