Last Updated on August 1, 2021 by Admin
Which of the following technique protects from flooding attacks originated from the valid prefixes (IP addresses) so that they can be traced to its true source?
- Rate Limiting
- Egress Filtering
- Ingress Filtering
- Throttling