What are four technologies that can be used to trace the source of an attack in a
network environment with multiple exit/entry points? (Choose four.)
A.
Remotely-triggered destination-based black holing
B.
ICMP Unreachable messages
C.
Sinkholes
D.
Traffic scrubbing
E.
A honey pot
F.
NetFlowv9
Explanation:
DDoS mitigation is a set of techniques for resisting distributed denial-of-service (DDoS)
attacks on networks attached to the Internet by protecting the target and relay networks.[1] This is done by passing network traffic addressed to the attacked network
through high-capacity networks with “traffic scrubbing” filters.[2] DDoS mitigation requires correctly identifying incoming traffic to separate human traffic from human-like
bots and hijacked web browsers. The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP
headers, and Javascript footprints.
In computer terminology, a honeypot is a computer security mechanism set to detect,
deflect, or, in some manner, counteract attempts at unauthorized use of information
systems. Generally, a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site but is actually isolated and monitored, and that
seems to contain information or a resource of value to attackers, which are then
blocked. This is similar to the police baiting a criminal and then conducting undercover
surveillance, and finally punishing the criminal.