Malicious traffic from an internal network has been detected on an unauthorized port on
an application server.
Which of the following network-based security controls should the engineer consider implementing?
A. ACLs
B. HIPS
C. NAT
D. MAC filtering