Which of the following attacks allows the bypassing of access control lists on servers or routers, and helps an attacker to hide?

Which of the following attacks allows the bypassing of access control lists on servers or routers,
and helps an attacker to hide? Each correct answer represents a complete solution. Choose two.

Which of the following attacks allows the bypassing of access control lists on servers or routers,
and helps an attacker to hide? Each correct answer represents a complete solution. Choose two.

A.
DNS cache poisoning

B.
MAC spoofing

C.
IP spoofing attack

D.
DDoS attack



Leave a Reply 0

Your email address will not be published. Required fields are marked *