A network administrator is concerned that the network is vulnerable to a denial-of-service attack. What steps should be taken to reduce this threat? (Select all that apply.)

A) Prevent intrusions.
B) Configure the router to block directed broadcasts to the network.
C) Set up a spoofing account so that the attacker doesn't know which machine to attack.
D) Use access lists to allow only sources from the network to enter the router's interfaces.
E) There isn't a way to reduce this threat.


A, B, D

Computer Science & Information Technology

You might also like to view...

A(n) ________ is when the field only depends on one part of a composite or concatenated key

A) determinate B) transitive dependency C) partial dependency D) atomic record

Computer Science & Information Technology

When a formula contains operators with the same precedence level, Excel evaluates the operators from right to left

Indicate whether the statement is true or false

Computer Science & Information Technology

How did the management pyramid influence your decisions?

What will be an ideal response?

Computer Science & Information Technology

A gray box displays around fieldset elements

Indicate whether the statement is true or false

Computer Science & Information Technology