exam questions

Exam 312-39 All Questions

View all questions & answers for the 312-39 exam

Exam 312-39 topic 1 question 85 discussion

Actual exam question from ECCouncil's 312-39
Question #: 85
Topic #: 1
[All 312-39 Questions]

Which of the following technique protects from flooding attacks originated from the valid prefixes (IP addresses) so that they can be traced to its true source?

  • A. Rate Limiting
  • B. Egress Filtering
  • C. Ingress Filtering
  • D. Throttling
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Berro_b
1 month, 2 weeks ago
Selected Answer: C
p 795 Ingress filtering prevents source address spoofing of Internet traffic It protects from flooding attacks which originate from the valid prefixes (IP addresses) It enables the originator to be traced to its true source.
upvoted 1 times
...
Ruso_1985
7 months, 4 weeks ago
The answer is C.
upvoted 1 times
...
BLAD_KD
7 months, 4 weeks ago
Answer C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...