Which of the following can be used to defend against SYN flood attacks?

a. Micro blocks
b. SYN cookies
c. Stateful packet inspection firewalls
d. All the above


ANS: D

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 8-1Software Solutions, Incorporated maintains a Web site that displays their different products for users to view before deciding to purchase them. They have come to you to upgrade their Web site to allow customers to view their products, create online product brochures, and post their comments on products. To create a blue text shadow that is 10 pixels to the right and 5 pixels down from the text with a blur size of 10 pixels, you would use the following text style: ____.

A. text-style: blue 5px 10px 10px; B. text-style: blue 10px 10px 5px; C. text-style: blue 10px 5px 10px; D. text-style: blue 5px 10px 15px;

Computer Science & Information Technology

________ acts as a cell phone with a card reader built into it; it will allow you to make secure purchases anywhere.

(a) eConnect. (b) eCashPad. (c) ePocketPay. (d) Visa Cash.

Computer Science & Information Technology

You can format footers to display differently on even pages and:

a. subordinate pages b. odd pages c. uneven pages

Computer Science & Information Technology

Which of the following variable names is invalid?

A. Final Score B. Player# C. @Score D. All of the above

Computer Science & Information Technology