Logs show an unauthorized IP address entering a secure part of the network every night at 8:00 pm. The network administrator is concerned that this IP address will cause an issue to a critical server and would like to deny the IP address at the edge of the network. Which of the following solutions would address these concerns?
While waking from the parking lot lo an access-controlled door an employee sees an authorized user open the door. Then the employee notices that another person catches the door before It closes and goes inside Which of the following attacks Is taking place?
A company that replicated the production environment in a cloud environment is starting to use a load balancer to evenly distribute requests between both environments. Which of the following does this scenario best describe?
A network administrator is adding a new wired loT device to the internal network. The only devices that will be communicating are the HVAC system and the loT device. Which of the following should the network administrator do?