A network administrator is concerned that the network is vulnerable to a denial-of-service attack. What steps should be taken to reduce this threat? (Select all that apply.)
A) Prevent intrusions.
B) Configure the router to block directed broadcasts to the network.
C) Set up a spoofing account so that the attacker doesn't know which machine to attack.
D) Use access lists to allow only sources from the network to enter the router's interfaces.
E) There isn't a way to reduce this threat.
A, B, D
You might also like to view...
A(n) ________ is when the field only depends on one part of a composite or concatenated key
A) determinate B) transitive dependency C) partial dependency D) atomic record
When a formula contains operators with the same precedence level, Excel evaluates the operators from right to left
Indicate whether the statement is true or false
How did the management pyramid influence your decisions?
What will be an ideal response?
A gray box displays around fieldset elements
Indicate whether the statement is true or false