To which of the following attacks are ACLs most susceptible?
A. smurf
B. IP spoofing
C. teardrop
D. SYN flood
B
Explanation: The inherent limitation of ACLs is their inability to detect if IP spoofing is occurring. IP address spoofing is one of techniques used by hackers to hide their trail or to masquerade as another computer. The hacker alters the IP address as it appears in the packet. This can sometimes allow the packet to get through an ACL that is based on IP addresses. It also can be used to make a connection to a system that only trusts certain IP addresses or ranges of IP addresses.
You might also like to view...
The C++ compiler makes objects take up more space in memory if they:
a. Are derived from base classes. b. Have virtual functions. c. Have only protected members. d. Are referenced by pointers.
Custom file properties that are added to files as key words which enable you to categorize and organize files are called ________
A) labels B) tags C) marks D) tabs
A manufacturer wants to create a disk with a rotational latency of 1 ms. What rotational speed is necessary to achieve this value?
What will be an ideal response?
____ is equivalent to (*pointer).member.
A. *pointer.member B. pointer>member C. pointer->member D. pointer@member