A company reports a surge of external port scanning attempts on its cloud-facing network interface. The team plans to use a firewall for inbound filtering to block unauthorized requests. Which approach is most likely to prevent these attempts while allowing rule-based controls for incoming data?
Require encryption of all incoming connections onto the private network
Set static routing entries to direct incoming requests to a private subnet
Deploy a perimeter filter that examines packets by checking source addresses and connection ports
Implement a data delivery system to cache responses at multiple endpoints
A perimeter device that monitors incoming flows by checking IP addresses and ports is an example of a firewall solution. It inspects traffic and blocks or allows it based on established rules, stopping port scanning and other attacks. Using static routes or encryption does not enforce rule-based filtering. A content distribution layer addresses performance issues, and it does not inherently stop scanning attempts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a firewall and how does it help prevent port scanning attempts?
Open an interactive chat with Bash
How does port scanning work and why is it a security concern?
Open an interactive chat with Bash
What is the difference between perimeter-based and host-based firewalls?