INTRODUCTION
OVERVIEW OF THE INTERNET
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
block the IP address on the firewall
|
|
block the IP address at the proxy server
|
|
redirect the IP address to the DMZ
|
|
limit the total number of sessions from any IP address
|
Detailed explanation-1: -Use network security systems, such as firewalls, or consider using DoS protection services that may be available through your service provider. Contact your Internet or cloud service provider as soon as possible. Recover. Check for signs of other malicious activity that may have taken place during the DoS attack.
Detailed explanation-2: -In an IP address spoofing DDoS attack, the attacker modifies the source IP address of the data packet to disguise an attacker’s origin IP. A botnet is a collection of infected or compromised bots that are geographically distributed. These botnets may be remotely instructed to launch DDoS attacks.
Detailed explanation-3: -Use strong verification and authentication methods for all remote access. Make an ACL of IP addresses. Use both ingress and egress packet filtering. Use antivirus and other security software that watches for suspicious network activity. More items