answersLogoWhite

0


Best Answer

ICMP

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What protocols should be blocked to prevent trojans and malicious traffic?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What computer protocol should be blocked to prevent malicious traffic and Trojan's?

Pretty much every protocol used for malicious traffic and Trojans is also used for legitimate traffic. You cannot block all bad traffic just by filtering on protocols. When given that ICMP and HTTP are both allowed, if you have to block one, block ICMP. Choices were: DNS DHCP ICMP HTTP https://library.skillport.com/courseware/cbtlib/TPSY0201/metadata/eng/TPSY0201B.htm?


How do you block traffic attempting to exit a LAN?

Generally traffic exiting a LAN is controlled at the router or firewall by setting rules in the configuration files for the router or firewall restricting what IP addresses traffic can be sent to, what devices outbound traffic can be sent from. You can also set rules controlling what outbound ports, protocols, and services will be blocked or allowed. Generally the best way to configure is "deny all and allow by exception" where all traffic is blocked by default and then rules are inserted to allow exceptions for specific traffic. You would also insert settings into the Access Control List.


What are routed protocols?

Routed protocols are the best paths in a network along which to send network traffic.


How do you use the word blocked in a sentence?

the street was blocked by traffic


Which device passively monitors the network for malicious traffic?

IDS


What is a traffic jam at an intersection called?

blocked lanes


What are the 3 protocal in application layer?

There are more than 3 protocols at the application layer. Three well-known protocols are: HTTP - web page traffic FTP - file transfer traffic SMTP - email transfer


Which plane controls the flow of information by ensuring that the relevant set of protocols transports the traffic?

Management plane


What is included in a network traffic signature?

protocols, TCP/IP headers, attack signatures, prot numbers


How does the traffic light benefit society?

Traffic lights keep traffic organized, keep people safe, prevent people from being run over, and prevent car crashes.


You are retrieving your boat from the water. What should you do to prevent a traffic jam on the boat ramp?

What should you do to prevent a traffic jam on the boat ramp


What feature allows the switches to pass VLAN traffic between switches?

vlan trunking protocols. eg :802.1q ,ISL