During a security incident, the security operations team identified sustained network traffic from a malicious IP address: 10.1.4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization’s network. Which of the following fulfills this request?
dbrowndiver
Highly Voted 8 months, 2 weeks agoPukaSudu
Most Recent 10 months, 3 weeks agoSHADTECH123
11 months agoshady23
11 months, 1 week agoMehsotopes
11 months, 1 week agorjbb
11 months, 1 week ago