How would you characterize the source and type in a Denial of Service attack on a router?
A.
By setting up and access-list to permit all ICMP, TCP, and UDP traffic with the log or lot
????¨¬?Cinput commands, then use the show access-list and show log commands to determine
the type and source of attack
B.
By performing a ??show ip interface?? to see the type and source of the attack based upon the
access-list matches
C.
By applying and access-list to all incoming and outgoing interfaces, turning off route-cache on
all interfaces, then, when telnetting into the router perform a ‘debug ip packet detail’.
D.
By performing a ??show interface?? to see the transmitted load ???txload??? and receive load
???rxload ???, if the interface utilization is not maxed out, there is no attack underway