A security audit has determined we have some rather large security flaws in our organization. The IT Security team has been asked to suggest mitigation strategies using the OSI model, what could we use for layer 3?
A: Access Lists.
B: Shut down open unused ports.
C: Installing UPS’ in the data center.
D: Start using firewalls.
CBK 4: Communication and Network Security
Source: ThorTeaches.com practice tests
A: ACL (access control list) is a sequential list of permit or deny statements that apply to the IP address and or upper-layer protocols. Packet filtering works at the network layer (layer 3) of the OSI model.