Each server on a subnet is configured to only allow SSH access from the administrator’s workstation. Which of
the following BEST describes this implementation?
Host intrusion prevention
A host-based firewall is installed on a client system and is used to protect the client system from the activities of
the user as well as from communication from the network or Internet. These firewalls manage network traffic
using filters to block certain ports and protocols while allowing others to pass through the system.