ExamGecko
Question list
Search
Search

Related questions











Question 269 - H12-731_V2.0 discussion

Report
Export

If the attacker uses a fake address to launch a TCP flood attack Which of the following defenses is most effective? (single).

A.
Source verification
Answers
A.
Source verification
B.
Fingerprint learning
Answers
B.
Fingerprint learning
C.
Session checking
Answers
C.
Session checking
D.
Load inspection
Answers
D.
Load inspection
Suggested answer: A
asked 18/09/2024
Ali S Zahedi
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first