A team wants to manage incoming connections in a subnetwork environment by matching source and destination addresses, ports, and protocols at the boundary. Which method best satisfies these requirements?
A stateless boundary rule set that examines source and destination details to permit or block traffic before it reaches the systems
A firewall inside each host that rejects unwanted inbound requests at the operating system level
A set of restrictions on database users designed to limit table operations
An in-line analyzer that prioritizes threat detection and matches patterns in the payload
A stateless boundary rule set analyzes traffic before it reaches the systems, using source and destination addresses, ports, and protocols to allow or deny requests. Host-level firewalls operate at the instance layer, so they do not block threats that never reach the host. Intrusion detection tools focus on identifying malicious content rather than enforcing boundary restrictions. Policies at the data layer target user permissions, not the broader network traffic filtering process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a stateless boundary rule set?
Open an interactive chat with Bash
How does a stateless firewall differ from a host-based firewall?
Open an interactive chat with Bash
Why is an in-line analyzer not suitable for traffic filtering at the boundary?