Which of the following solutions will MOST likely mitigate this type of attack?

The security administrator at a bank is receiving numerous reports that customers are unable to
login to the bank website. Upon further investigation, the security administrator discovers that the
name associated with the bank website points to an unauthorized IP address.
Which of the following solutions will MOST likely mitigate this type of attack?

The security administrator at a bank is receiving numerous reports that customers are unable to
login to the bank website. Upon further investigation, the security administrator discovers that the
name associated with the bank website points to an unauthorized IP address.
Which of the following solutions will MOST likely mitigate this type of attack?

A.
Security awareness and user training

B.
Recursive DNS from the root servers

C.
Configuring and deploying TSIG

D.
Firewalls and IDS technologies



Leave a Reply 1

Your email address will not be published. Required fields are marked *


TWB

TWB

WHen you are using DDNS, TSIG is used to authenticate updates to DDNS.

Remember TSIG is used to provide a means of authenticating updates to a DDNS database.