A system administrator identifies unusual network traffic from outside the local network. Which of the following
is the BEST method for mitigating the threat?
Malware scanning
Port blocking
Packet capturing
Content filtering
Submit