List of questions
Related questions
Question 269 - H12-731_V2.0 discussion
If the attacker uses a fake address to launch a TCP flood attack Which of the following defenses is most effective? (single).
A.
Source verification
B.
Fingerprint learning
C.
Session checking
D.
Load inspection
Your answer:
0 comments
Sorted by
Leave a comment first