Which of the following can be used to defend against SYN flood attacks?

a. Micro blocks
b. SYN cookies
c. Stateful packet inspection firewalls
d. All the above

ANS: D

Computer Science & Information Technology

You might also like to view...

By using the _________ method to create subreports, you can create and alter the subreport before adding it to the main report

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which will NOT be affected by a virus?

a. Hard drive files b. Master boot record c. Floppy diskettes d. ROM BIOS

Computer Science & Information Technology