Which of the following are ways to help defend against distributed denial-of-service attacks? (Select the three best answers)
A. Update firewalls.
B. Carefully select applications.
C. Use intrusion prevention systems.
D. Use a "clean pipe."
A, B, and D. Ways to help defend against distributed denial-of-service attacks include updating firewalls, using intrusion prevention systems, and using a clean pipe from your Internet service provider. You should always be careful when selecting applications; however, DDoS attacks will usually be perpetuated on specific servers that run specific applications that need to be functional. It is not the best answer, but you should always watch which applications you run.
You might also like to view...
The commitment to execute certain code to carry out a method invocation is referred to as _________________.
a) execution b) binding c) polymorphism d) inheritance e) none of the above
A relational database is a collection of:
A) related tables. B) forms. C) common fields. D) field values.
Cycle is a category of shapes.
Answer the following statement true (T) or false (F)
The _________________________ function is useful when you want to assign a value to a cell based on a logical test.
Fill in the blank(s) with the appropriate word(s).