A team wants to manage incoming connections in a subnetwork environment by matching source and destination addresses, ports, and protocols at the boundary. Which method best satisfies these requirements?
A stateless boundary rule set that examines source and destination details to permit or block traffic before it reaches the systems
A set of restrictions on database users designed to limit table operations
An in-line analyzer that prioritizes threat detection and matches patterns in the payload
A firewall inside each host that rejects unwanted inbound requests at the operating system level
A stateless boundary rule set analyzes traffic before it reaches the systems, using source and destination addresses, ports, and protocols to allow or deny requests. Host-level firewalls operate at the instance layer, so they do not block threats that never reach the host. Intrusion detection tools focus on identifying malicious content rather than enforcing boundary restrictions. Policies at the data layer target user permissions, not the broader network traffic filtering process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a stateless boundary rule set?
Open an interactive chat with Bash
How does a stateless firewall differ from a stateful firewall?
Open an interactive chat with Bash
Why is a stateless boundary rule set preferred for blocking traffic at the network boundary?
Open an interactive chat with Bash
CompTIA Cloud+ CV0-004
Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access