In an effort to bolster its network defenses following a data breach attributed to attackers disguising their origin, a company seeks to deploy a security measure on their routers that can distinguish between legitimate and fraudulent traffic patterns. What is the most appropriate action for the company to take to mitigate the risk of similar incidents?
Configure ACLs to validate traffic against established criteria
Update all network devices with complex, non-default credentials
Activate DHCP snooping features on the infrastructure
Assign specific network permissions through role-based policies