Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-39 All Questions

View all questions & answers for the 312-39 exam

Exam 312-39 topic 1 question 85 discussion

Actual exam question from ECCouncil's 312-39
Question #: 85
Topic #: 1
[All 312-39 Questions]

Which of the following technique protects from flooding attacks originated from the valid prefixes (IP addresses) so that they can be traced to its true source?

  • A. Rate Limiting
  • B. Egress Filtering
  • C. Ingress Filtering
  • D. Throttling
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Ruso_1985
1 week, 6 days ago
The answer is C.
upvoted 1 times
...
BLAD_KD
1 week, 6 days ago
Answer C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...