A security team has detected unusual traffic patterns and needs to prevent further suspicious activity from entering the network. Which of the following should they modify to block the suspicious traffic?

Prepare for the WGU ITAS6291 D488 Cybersecurity Architecture and Engineering exam. Use flashcards and multiple-choice questions, each with explanations and guidance. Master your knowledge and excel in your exam!

Modifying firewall rules is the most effective way to block suspicious traffic entering the network. Firewalls serve as a barrier between trusted internal networks and untrusted external networks, and they can filter traffic based on predetermined security rules. By updating firewall rules, the security team can specify which types of traffic are allowed or denied based on the observed unusual patterns. This proactive measure ensures that any potentially harmful data packets or connections are blocked before they can reach sensitive parts of the network or affect critical systems.

In this context, ACL (Access Control Lists) rules play a role but are often considered a component of firewall configurations. While endpoint protection focuses on securing individual devices against malware and attacks, it does not address the network traffic at a broader level. Update processes are essential for maintaining the latest security patches and managing vulnerabilities but do not specifically tackle the immediate concern of blocking suspicious traffic patterns. Therefore, modifying firewall rules directly addresses the need to control and mitigate risk from network threats.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy