Which of the following are ways to help defend against distributed denial-of-service attacks? (Select the three best answers)

A. Update firewalls.
B. Carefully select applications.
C. Use intrusion prevention systems.
D. Use a "clean pipe."


A, B, and D. Ways to help defend against distributed denial-of-service attacks include updating firewalls, using intrusion prevention systems, and using a clean pipe from your Internet service provider. You should always be careful when selecting applications; however, DDoS attacks will usually be perpetuated on specific servers that run specific applications that need to be functional. It is not the best answer, but you should always watch which applications you run.

Computer Science & Information Technology

You might also like to view...

The commitment to execute certain code to carry out a method invocation is referred to as _________________.

a) execution b) binding c) polymorphism d) inheritance e) none of the above

Computer Science & Information Technology

A relational database is a collection of:

A) related tables. B) forms. C) common fields. D) field values.

Computer Science & Information Technology

Cycle is a category of shapes.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The _________________________ function is useful when you want to assign a value to a cell based on a logical test.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology