Which of the following can be used to defend against SYN flood attacks?
a. Micro blocks
b. SYN cookies
c. Stateful packet inspection firewalls
d. All the above
ANS: D
Computer Science & Information Technology
You might also like to view...
By using the _________ method to create subreports, you can create and alter the subreport before adding it to the main report
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which will NOT be affected by a virus?
a. Hard drive files b. Master boot record c. Floppy diskettes d. ROM BIOS
Computer Science & Information Technology