What should you create to prevent spoofing of the internal network?
A.
A NAT rule
B.
An ACL
C.
A record in the host file
D.
A DNS record
The Answer Is:
B
This question includes an explanation.
Explanation:
TheCCST Cybersecurity Study Guidestates thatAccess Control Lists (ACLs)can be used to filter traffic based on IP addresses and block packets that appear to originate from the internal network but arrive from external interfaces (IP spoofing).
"ACLs can prevent spoofing by dropping traffic from external sources that claim to have an internal source address. Configuring ACLs on the perimeter firewall or router is a common countermeasure for IP spoofing."