Last Updated on August 1, 2021 by Admin 1
Which of the following technique protects from flooding attacks originated from the valid prefixes (IP addresses) so that they can be traced to its true source?
- Rate Limiting
- Egress Filtering
- Ingress Filtering
- Throttling