A network administrator is concerned that the network is vulnerable to a denial-of-service attack. What steps should be taken to reduce this threat? (Select all that apply.)
A) Prevent intrusions.
B) Configure the router to block directed broadcasts to the network.
C) Set up a spoofing account so that the attacker doesn't know which machine to attack.
D) Use access lists to allow only sources from the network to enter the router's interfaces.
E) There isn't a way to reduce this threat.
A, B, D
Computer Science & Information Technology
You might also like to view...
An If...Then statement can be used to compare two string values. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
____________________ can include symbols, vector graphics, bitmaps, video, and sound.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology