After implementing a new firewall rule, a company's remote employees suddenly cannot access the internal network through the VPN. The IT team suspects the rule is blocking the VPN traffic. To address this issue without compromising security, what should they consider adjusting in the firewall?
- Rule Complexity
- Rule Logging
- Rule Priority
- Rule Timing
Adjusting the 'Rule Priority' allows the company to ensure that the VPN traffic is processed before other rules, resolving the issue without compromising security.
Loading...
Related Quiz
- A phishing attack that involves multiple methods, such as emails and phone calls, to deceive victims is known as?
- Emily, a system administrator, is configuring a new server. She ensures that only necessary services run, disables default accounts, and sets strong password policies. What process is Emily engaged in?
- During a web application assessment, a security consultant observes that even though the application has a CSP header, it uses the unsafe-inline directive for scripts. What potential risk does this pose?
- In which type of attack does an attacker trick a victim into submitting a malicious request on their behalf?
- An attacker sets up a rogue wireless access point with the same SSID as a legitimate network to trick users into connecting to it. What is this type of attack called?