Security Learning Mode

Which of the following data filtering methods can be described as a whitelist approach?