which type of security threat is involved?

With ASM, sources can launch attacks by sending traffic to any groups that are
supported by an active RP. Such traffic might not reach a receiver but will reach at least
the first-hop router in the path, as well as the RP, allowing limited attacks. However, if
the attacking source knows a group to which a target receiver is listening and there are
no appropriate filters in place, then the attacking source can send traffic to that group.
This traffic is received as long as the attacking source is listening to the group.
Based on the above description, which type of security threat is involved?

With ASM, sources can launch attacks by sending traffic to any groups that are
supported by an active RP. Such traffic might not reach a receiver but will reach at least
the first-hop router in the path, as well as the RP, allowing limited attacks. However, if
the attacking source knows a group to which a target receiver is listening and there are
no appropriate filters in place, then the attacking source can send traffic to that group.
This traffic is received as long as the attacking source is listening to the group.
Based on the above description, which type of security threat is involved?

A.
DoS

B.
man-in-the-middle

C.
compromised key

D.
data modification



Leave a Reply 0

Your email address will not be published. Required fields are marked *