Which of the following tactics might be considered a part of a proactive network defense?
A.
Redundant firewalls
B.
Business Continuity planning
C.
Disallowing P2P traffic
D.
Perimeter surveillance and intelligence gathering
Explanation:
D: Ideally to counter an attack, network security must also be proactive, anticipate, and oppose the attack against their infrastructure by interdicting and disrupting an attack preemptively or in self-defense. This requires intelligence on the threat, active surveillance at the perimeter and beyond, and the ability to intercede upstream or disable a threat agents tools. Page 742.