A company's blocklist has outgrown the current technologist in place. The ACLs are at maximum, and the IPS signatures only allow a certain amount of space for domains to be added, creating the need for multiple signatures. which of the following configuration changes to the existing control would be the MOST appropriate to improve performance?

a. implement a host-file-based solution that will use a list of all domains to deny for all machines on the network
b. create an IDS for the current blocklist to determine which domains are showing activity and may need to be removed.
c. review the current clocklist the prioritize it based on the level of threat severity. Add the domains with the highest severity ot the blocklist and remove the lower-severity threats from it.
d. review the current blocklist to determine which domains can be removed from the list and then update the ACLs and IPS signatures.

Respuesta :

Lanuel

The configuration changes to the existing control which would be most appropriate to improve performance is: C. review the current blocklist and prioritize it based on the level of threat severity. Add the domains with the highest severity to the blocklist and remove the lower-severity threats from it.

What is access control?

An access control (ACL) can be defined as a security technique that is designed and developed to enable a computer system determine whether or not an end user has the minimum requirement, permissions and credentials to access, use or view file and folder resources that are stored on a computer.

Basically, an access control (ACL) can be configured to only allow a certain amount of space for domains to be added to a blocklist through the use of an  intrusion prevention system (IPS).

In this scenario, the technologist should review the current blocklist and prioritize it based on the level of threat severity, add the domains with the highest severity to the blocklist and then remove the lower-severity threats from it, in order to create more space for domains to be added.

Read more on access control here: https://brainly.com/question/3521353

ACCESS MORE
ACCESS MORE
ACCESS MORE
ACCESS MORE