53.6k views
5 votes
As a good security practice in a corporate environment, what is the type of ruleset that would be applied to the end of an access control list (acl) on the inbound and outbound border firewall(s)?

User Tj Gienger
by
7.8k points

1 Answer

6 votes

I don't know Search on Google

I don't know Search on Google

User Tejas Ardeshna
by
7.7k points