During an investigation, a security analyst determines suspicious activity occurred during the night shift over the weekend. Further investigation reveals the activity was initiated from an internal IP going to an external website.
Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in the future?
A . An IPS signature modification for the specific IP addresses
B . An IDS signature modification for the specific IP addresses
C . A firewall rule that will block port 80 traffic
D . A firewall rule that will block traffic from the specific IP addresses
Answer: D