Which two characteristics of the attack must you understand to configure the attack object?

You have been asked to configure a signature to block an attack released by a security vulnerability reporting agency. Which two characteristics of the attack must you understand to configure the attack object? (Choose two)

You have been asked to configure a signature to block an attack released by a security vulnerability reporting agency. Which two characteristics of the attack must you understand to configure the attack object? (Choose two)

A.
the source IP address of the attacker

B.
the protocol the attack is transported in

C.
a string or regular expression that occurs within the attack

D.
IPv4 routing header



Leave a Reply 1

Your email address will not be published. Required fields are marked *


networkmanagers

networkmanagers

I choose BC