After reviewing the following packet, a cybersecurity analyst has discovered an unauthorized service is running on a company’s computer.
Which of the following ACLs, if implemented, will prevent further access ONLY to the unauthorized service and will not impact other services?
DENY TCP ANY HOST 10.38.219.20 EQ 3389
DENY IP HOST 10.38.219.20 ANY EQ 25
DENY IP HOST192.168.1.10 HOST 10.38.219.20 EQ 3389
DENY TCP ANY HOST 192.168.1.10 EQ 25