The security administrator for Company InC. is working on defending the network against SYN
flooding attacks. Which of the following are tools to protect the network from TCP SYN attacks?
A.
Route authentication
B.
Encryption
C.
ACLs
D.
TCP intercept