answersLogoWhite

0


Best Answer

allow Ip out for all protcols

block Ip in for all protcols

block ICMP in/out

allow HTTP

However trojans can find another ways to enter the system, so you must use a good internet security product with firewall.

User Avatar

Pansy Altenwerth

Lvl 10
1y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

allow Ip out for all protcols

block Ip in for all protcols

block ICMP in/out

allow HTTP

However trojans can find another ways to enter the system, so you must use a good internet security product with firewall.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which protocol should be blocked to prevent trojan and malicious traffic?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What protocols should be blocked to prevent trojans and malicious traffic?

ICMP


What computer protocol should be blocked to prevent malicious traffic and Trojan's?

Pretty much every protocol used for malicious traffic and Trojans is also used for legitimate traffic. You cannot block all bad traffic just by filtering on protocols. When given that ICMP and HTTP are both allowed, if you have to block one, block ICMP. Choices were: DNS DHCP ICMP HTTP https://library.skillport.com/courseware/cbtlib/TPSY0201/metadata/eng/TPSY0201B.htm?


What is full form of the ips?

In computer terms, IPS stands for Intrusion Prevention System. An IPS is a network security device that monitors network traffic and system activity for malicious activity.


Which device or devices should have the Spanning Tree Protocol enabled to prevent host traffic from creating a broadcast storm?

Core_S1, Access_S2, and Access_S3


How do you use the word blocked in a sentence?

the street was blocked by traffic


Which device passively monitors the network for malicious traffic?

IDS


What is a traffic jam at an intersection called?

blocked lanes


What do you do when you accidentally blocked an internet browser with your antivirus software How do you unblock it?

If you have a firewall, you should be able to go to your firewall and edit the traffic options, which dictates what programs get Internet access and which ones don't. Edit the protocol for your Internet browser to unblock it.


What protocol and port does http web traffic use?

What protocol is used by web servers and on which port ?


What is the name of the protocol for handling TCP traffic through a proxy server?

The protocol used for handling TCP traffic through a proxy server is called SOCKS, which means \"Socket Secure\".


How do you block traffic attempting to exit a LAN?

Generally traffic exiting a LAN is controlled at the router or firewall by setting rules in the configuration files for the router or firewall restricting what IP addresses traffic can be sent to, what devices outbound traffic can be sent from. You can also set rules controlling what outbound ports, protocols, and services will be blocked or allowed. Generally the best way to configure is "deny all and allow by exception" where all traffic is blocked by default and then rules are inserted to allow exceptions for specific traffic. You would also insert settings into the Access Control List.


How do you trace the network traffic?

Tracing network traffic requires a network monitor, protocol analyzer, or packet sniffer.