To which of the following attacks are ACLs most susceptible?

A. smurf
B. IP spoofing
C. teardrop
D. SYN flood


B
Explanation: The inherent limitation of ACLs is their inability to detect if IP spoofing is occurring. IP address spoofing is one of techniques used by hackers to hide their trail or to masquerade as another computer. The hacker alters the IP address as it appears in the packet. This can sometimes allow the packet to get through an ACL that is based on IP addresses. It also can be used to make a connection to a system that only trusts certain IP addresses or ranges of IP addresses.

Computer Science & Information Technology

You might also like to view...

The C++ compiler makes objects take up more space in memory if they:

a. Are derived from base classes. b. Have virtual functions. c. Have only protected members. d. Are referenced by pointers.

Computer Science & Information Technology

Custom file properties that are added to files as key words which enable you to categorize and organize files are called ________

A) labels B) tags C) marks D) tabs

Computer Science & Information Technology

A manufacturer wants to create a disk with a rotational latency of 1 ms. What rotational speed is necessary to achieve this value?

What will be an ideal response?

Computer Science & Information Technology

____ is equivalent to (*pointer).member.

A. *pointer.member B. pointer>member C. pointer->member D. pointer@member

Computer Science & Information Technology