An organization uses IP address block 203.0.113.0/24 on its internal network. At the border router, the network
administrator sets up rules to deny packets with a source address in this subnet from entering the network, and
to deny packets with a destination address in this subnet from leaving the network. Which of the following is the
administrator attempting to prevent?
A.
BGP route hijacking attacks
B.
Bogon IP network traffic
C.
IP spoofing attacks
D.
Man-in-the-middle attacks
E.
Amplified DDoS attacks