A system administrator identifies unusual network traffic from outside the local network. Which of the following is the BEST method for mitigating the threat?
A system administrator identifies unusual network traffic from outside the local network. Which of the following is the BEST method for mitigating the threat?
The best method for mitigating unusual network traffic from outside the local network is port blocking. By blocking unnecessary ports, potential threats can be prevented from accessing the network, thereby mitigating the threat effectively.
B Should be the correct answer.
B. Port blocking
C should not be correct - as capture will not prevent anything