which Junos Screen option should you enable to limit the effects of the attack while allowing legitimate traffic?

Refer to the Exhibit.

A server in the DMZ of your company is under attack. The attacker is opening a large number of
TCP connections to your server which causes resource utilization problems on the server. All of
the connections from the attacker appear to be coming from a single IP address.
Referring to the exhibit, which Junos Screen option should you enable to limit the effects of the
attack while allowing legitimate traffic?

Refer to the Exhibit.

A server in the DMZ of your company is under attack. The attacker is opening a large number of
TCP connections to your server which causes resource utilization problems on the server. All of
the connections from the attacker appear to be coming from a single IP address.
Referring to the exhibit, which Junos Screen option should you enable to limit the effects of the
attack while allowing legitimate traffic?

A.
Apply the Junos Screen option limit-session source-based-ip to the Untrust security zone.

B.
Apply the Junos Screen option limit-session source-based-ip to the DMZ security zone.

C.
Apply the Junos Screen option limit-session destination-based-ip to the Untrust security zone.

D.
Apply the Junos Screen option limit-session destination-based-ip to the DMZ security zone.



Leave a Reply 0

Your email address will not be published. Required fields are marked *