Which two network attack statements are true?()
- A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
- B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.
- C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.
- D、DoS attacks can consist of IP spoofing and DDoS attacks.
- E、IP spoofing can be reduced through the use of policy-based routing.
- F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.
正确答案:A,D
答案解析:有

微信扫一扫手机做题