问题:
An attacker is launching a DoS attack on the Company network using a hacking tool designed to exhaust the IP address space available from the DHCP servers for a period of time.
Which procedure would best defend against this type of attack? ()
A . Configure only trusted interfaces with root guard.
B . Implement private VLANs (PVLANs) to carry only user traffic.
C . Implement private VLANs (PVLANs) to carry only DHCP traffic.
D . Configure only untrusted interfaces with root guard.
E . Configure DHCP spoofing on all ports that connect untrusted clients.
F . Configure DHCP snooping only on ports that connect trusted DHCP servers.
G . None of the other alternatives apply
An attacker is launching a DoS attack on the Company network using a hacking tool designed to exhaust the IP address space available from the DHCP servers for a period of time.
Which procedure would best defend against this type of attack? ()
● 参考解析
本题暂无解析
相关内容
相关标签