Several users are reporting connectivity issues with their laptops. Upon further investigation, the network
technician identifies that their laptops have been attacked from a specific IP address outside of the network.
Which of the following would need to be configured to prevent any further attacks from that IP address?

A.
Port security
B.
IDS
C.
Firewall rules
D.
Switch VLAN assignments
IDS only detects attacks
switch VLAN assignments/ports- these ports are referred to as access ports and provide a connection for end users.
port security- with dynamically learned and static MAC addresses to restrict a port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic into the port.
firewall rules- by restricting traffic can prevent future attacks
0
0