Which of the following attack types should be mitigated in the data center core layer?
A.
port scans
B.
IP spoofing
C.
DDoS attacks
D.
MAC address spoofing
Which of the following attack types should be mitigated in the data center core layer?
Which of the following attack types should be mitigated in the data center core layer?
A.
port scans
B.
IP spoofing
C.
DDoS attacks
D.
MAC address spoofing