An organization wishes to enforce policies that restrict access to sensitive resources from unauthorized network segments. Which security rule should primarily be configured to manage this access?
An Access control list (ACL) is the correct answer because it is used to define which users or systems are granted access to specific resources. ACLs can restrict access to network resources based on IP addresses, protocols, or ports, effectively controlling which packets are allowed through a router or firewall. In contrast, MAC filtering is mainly used to allow or deny network access based on hardware addresses, which is less about resource specific permissions and more about network access. Content filtering manages access to specific types of content rather than securing resources based on network segments. Disabling unused ports is a precautionary security measure to minimize unnecessary network entry points, but it does not involve resource access permissions between network segments.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Access Control Lists (ACLs) and how do they work?
Open an interactive chat with Bash
What is the difference between static and dynamic ACLs?