A core authentication server is exposed to the internet and is connected to sensitive services. How can you restrict connections to secure the server from getting compromised by a hacker? Check all that apply.

Respuesta :

Answer:

Secure firewall , Access Control Lists (ACLs) , and Bastion hosts

Explanation:

In this scenario, the best options to be able to accomplish this would be a Secure firewall , Access Control Lists (ACLs) , and Bastion hosts. A secure firewall and an access control list will prevent specific harmful files and computers from entering a network unless it has the proper clearance. A bastion host on the other hand is a special-purpose computer on a network specifically designed and configured to withstand attacks, acting as a secondary defense mechanism.

It is possible to restrict connections by using a secure firewall, bastion hosts, and access control lists (ACLs).

  • A firewall can be defined as a security device that protects the network by filtering traffic and blocking unauthorized access.

  • A bastion host is a computer in a network that is designed and configured to withstand attacks.

  • An access control list (ACL) refers to a table that indicates an operating system the access rights of each specific user.

In conclusion, it is possible to restrict connections by using a secure firewall, bastion hosts, and access control lists (ACLs).

Learn more in:

https://brainly.com/question/11921446