Which of the following technique protects from flooding attacks originated from the valid prefixes (IP addresses) so that they can be traced to its true source?
p 795
Ingress filtering prevents source address spoofing of Internet traffic
It protects from flooding attacks which originate from the valid prefixes (IP addresses)
It enables the originator to be traced to its true source.
This section is not available anymore. Please use the main Exam Page.312-39 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Berro_b
1 month, 2 weeks agoRuso_1985
7 months, 4 weeks agoBLAD_KD
7 months, 4 weeks ago