Refer to the exhibit. Which security technique would you use to tune DoS attack mitigation for each individual application?
A.
VACLs
B.
router ACLs
C.
control plane policing
D.
drop and shutdown thresholds
Refer to the exhibit. Which security technique would you use to tune DoS attack mitigation for each individual application?
A.
VACLs
B.
router ACLs
C.
control plane policing
D.
drop and shutdown thresholds