Respuesta :
Answer:
Secure firewall , Access Control Lists (ACLs) , and Bastion hosts
Explanation:
In this scenario, the best options to be able to accomplish this would be a Secure firewall , Access Control Lists (ACLs) , and Bastion hosts. A secure firewall and an access control list will prevent specific harmful files and computers from entering a network unless it has the proper clearance. A bastion host on the other hand is a special-purpose computer on a network specifically designed and configured to withstand attacks, acting as a secondary defense mechanism.
It is possible to restrict connections by using a secure firewall, bastion hosts, and access control lists (ACLs).
- A firewall can be defined as a security device that protects the network by filtering traffic and blocking unauthorized access.
- A bastion host is a computer in a network that is designed and configured to withstand attacks.
- An access control list (ACL) refers to a table that indicates an operating system the access rights of each specific user.
In conclusion, it is possible to restrict connections by using a secure firewall, bastion hosts, and access control lists (ACLs).
Learn more in:
https://brainly.com/question/11921446