Malicious traffic from an internal network has been detected on an unauthorized port on an application server.
Which of the following network-based security controls should the engineer consider implementing?
A . ACLs
B . HIPS
C . NAT
D . MAC filtering
Answer: A