Which of the following controls should critical application servers implement to protect themselves from other
potentially compromised application services?
A host-based firewall is designed to protect the host from network based attack by using filters to limit the
network traffic that is allowed to enter or leave the host. The action of a filter is to allow, deny, or log the network
packet. Allow enables the packet to continue toward its destination. Deny blocks the packet from going any
further and effectively discarding it. Log records information about the packet into a log file. Filters can be based
on protocol and ports. By blocking protocols and ports that are not required, other potentially compromised
application services would be prevented from being exploited across the network.