Below is a screenshot from a deployed next-generation firewall.
These configuration settings would be a defensive measure for which CIS Control?
A . Controlled Access Based on the Need to Know
B . Limitation and Control of Network Ports, Protocols and Services
C . Email and Web Browser Protections
D . Secure Configuration for Network Devices, such as Firewalls, Routers and Switches.
Answer: C