Click the Exhibit button.
A server in the DMZ of your company is under attack. The attacker is opening a large number of TCP
connections to your server which causes resource utilization problems on the server. All of the connections
from the attacker appear to be coming from a single IP address.
Referring to the exhibit, which Junos Screen option should you enable to limit the effects of the attack while
allowing legitimate traffic?
A.
Apply the Junos Screen option limit-session source-based-ip to the Untrust security zone.
B.
Apply the Junos Screen option limit-session source-based-ip to the DMZ security zone.
C.
Apply the Junos Screen option limit-session destination-based-ip to the Untrust security zone.
D.
Apply the Junos Screen option limit-session destination-based-ip to the DMZ security zone.