A technician wants to implement a firewall ACL to block external access to the company's SSH server. Which of the following should the technician implement to configure the firewall so it will inform the source of the action taken by the ACL? A. Use the LOG option B. Use the REJECT option C. Use the CONNTRACK option D. Use the DROP option  Suggested Answer: C Community Answer: B Reference: https://manpages.debian.org/jessie/conntrack/conntrack.8.en.html#:~:text=This%20tool%20can%20be%20used,and%20even%20add%20new% 20ones This question is in XK0-004 CompTIA Linux+ Exam For getting CompTIA Linux+ Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by CompTIA. Trademarks, certification & product names are used for reference only and belong to CompTIA. The website does not contain actual questions and answers from CompTIA's Certification Exams.
Please login or Register to submit your answer