TheCCST Cybersecurity Study Guidestates thatAccess Control Lists (ACLs)can be used to filter traffic based on IP addresses and block packets that appear to originate from the internal network but arrive from external interfaces (IP spoofing).
"ACLs can prevent spoofing by dropping traffic from external sources that claim to have an internal source address. Configuring ACLs on the perimeter firewall or router is a common countermeasure for IP spoofing."
A(NAT rule) changes IP addresses but does not inherently prevent spoofing.
B(ACL) is correct because it can enforce anti-spoofing filters.
C(host file) only affects name resolution locally.
D(DNS record) is for domain mapping, not spoofing prevention.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit