To which of the following attacks are ACLs most susceptible?

A. smurf
B. IP spoofing
C. teardrop
D. SYN flood

B
Explanation: The inherent limitation of ACLs is their inability to detect if IP spoofing is occurring. IP address spoofing is one of techniques used by hackers to hide their trail or to masquerade as another computer. The hacker alters the IP address as it appears in the packet. This can sometimes allow the packet to get through an ACL that is based on IP addresses. It also can be used to make a connection to a system that only trusts certain IP addresses or ranges of IP addresses.

Computer Science & Information Technology

You might also like to view...

A title is a(n) ________ given to a figure in a document, numbered sequentially

Fill in the blank(s) with correct word

Computer Science & Information Technology

SVG stands for ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology