Which feature can you implement to protect against SYN-flooding DoS attacks?
A.
TCP intercept
B.
a null zero route
C.
CAR applied to ICMP packets
D.
the ip verify unicast reverse-path command
Which feature can you implement to protect against SYN-flooding DoS attacks?
Which feature can you implement to protect against SYN-flooding DoS attacks?
A.
TCP intercept
B.
a null zero route
C.
CAR applied to ICMP packets
D.
the ip verify unicast reverse-path command