How are IP spoofing attacks mitigated in the SAFE SMR midsize network design corporate
Internet module?
A.
filtering at the ISP, edge router, and corporate firewall
B.
RFC 2827 and 1918 filtering at ISP edge and midsize network edge router
C.
IDS at the host and network levels
D.
OS and IDS detection
E.
CAR at the ISP edge and TCP setup controls at the firewall
F.
e-mail content filtering, HIDS, and host-based virus scanning