To which of the following attacks are ACLs most susceptible?
A. smurf
B. IP spoofing
C. teardrop
D. SYN flood
B
Explanation: The inherent limitation of ACLs is their inability to detect if IP spoofing is occurring. IP address spoofing is one of techniques used by hackers to hide their trail or to masquerade as another computer. The hacker alters the IP address as it appears in the packet. This can sometimes allow the packet to get through an ACL that is based on IP addresses. It also can be used to make a connection to a system that only trusts certain IP addresses or ranges of IP addresses.
Computer Science & Information Technology