Which of the following devices is MOST likely being used when processing the following?
1 PERMIT IP ANY ANY EQ 80
2 DENY IP ANY ANY

A.
Firewall
B.
NIPS
C.
Load balancer
D.
URL filter
Explanation:
Firewalls, routers, and even switches can use ACLs as a method of security management. An
access control list has a deny ip any any implicitly at the end of any access control list. ACLs deny
by default and allow by exception.