ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 26 - JN0-664 discussion

Report
Export

You are asked to protect your company's customers from amplification attacks. In this scenario, what is Juniper's recommended protection method?

A.
ASN prepending
Answers
A.
ASN prepending
B.
BGP FlowSpec
Answers
B.
BGP FlowSpec
C.
destination-based Remote Triggered Black Hole
Answers
C.
destination-based Remote Triggered Black Hole
D.
unicast Reverse Path Forwarding
Answers
D.
unicast Reverse Path Forwarding
Suggested answer: C

Explanation:

amplification attacks are a type of distributed denial-of-service (DDoS) attack that exploit the characteristics of certain protocols to amplify the traffic sent to a victim. For example, an attacker can send a small DNS query with a spoofed source IP address to a DNS server, which will reply with a much larger response to the victim. This way, the attacker can generate a large amount of traffic with minimal resources.

One of the methods to protect against amplification attacks is destination-based Remote Triggered Black Hole (RTBH) filtering. This technique allows a network operator to drop traffic destined to a specific IP address or prefix at the edge of the network, thus preventing it from reaching the victim and consuming bandwidth and resources. RTBH filtering can be implemented using BGP to propagate a special route with a next hop of 192.0.2.1 (a reserved address) to the edge routers. Any traffic matching this route will be discarded by the edge routers.

asked 18/09/2024
Arndt Langer
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first