how should you secure the borders from these attacks while allowing legitimate traffic to pass through?

Click the Exhibit button.

In the process of securing your network from network reconnaissance, you notice that a large number of random packets are destined for unused segments on your network.

Referring to the exhibit, how should you secure the borders from these attacks while allowing legitimate traffic to pass through?

In the process of securing your network from network reconnaissance, you notice that a large number of random packets are destined for unused segments on your network.

Referring to the exhibit, how should you secure the borders from these attacks while allowing legitimate traffic to pass through?

A.
Configure SYN fragment protection to prevent these types of packets from entering the network.

B.
Configure IP sweep protection to rate-limit the number of allowed packets.

C.
Configure TCP sweep protection to rate-limit the number of allowed packets to enter

D.
Configure the teardrop screen to prevent these types of packets from entering your network.



Leave a Reply 0

Your email address will not be published. Required fields are marked *