Computers and Technology
Computers and Technology, 24.06.2021 02:40, tobi15

An engineer learns a new security threat mitigation technique. The technique maps an IP address to a non-existent host, and is useful in stopping denial of service attacks. Traffic heading to these IPs can be captured for analysis or discarded. Considering the given strategies, which does this technique relate to? Select all that apply. A. Black hole
B. Sinkhole
C. Forward proxying
D. Reverse proxying

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 08:00, jcastronakaya
Apex q: what does a low employment rate indicate? a. not many people are earning high salaries b. not many people are going to college c. not many people are renting their homes d. not many people have jobs
Answers: 2
image
Computers and Technology, 23.06.2019 00:30, lm18618
Which one of the following is considered a peripheral? a software b mouse c usb connector d motherboard
Answers: 2
image
Computers and Technology, 23.06.2019 06:20, Ab20600
Which text function capitalizes the first letter in a string of text? question 10 options: upper capital first proper
Answers: 1
image
Computers and Technology, 24.06.2019 07:00, AnaiyaKirksey8
You are most likely to automatically encode information about
Answers: 1
Do you know the correct answer?
An engineer learns a new security threat mitigation technique. The technique maps an IP address to a...

Questions in other subjects:

Konu
Social Studies, 06.06.2021 15:20
Konu
Mathematics, 06.06.2021 15:20
Konu
Mathematics, 06.06.2021 15:20
Konu
Mathematics, 06.06.2021 15:20
Konu
Mathematics, 06.06.2021 15:20