What are three technologies that can be used to trace the source of an attack in a network environment with multiple exit/entry points?

What are three technologies that can be used to trace the source of an attack in a network environment with multiple exit/entry points? (Choose three)
A. Remotely-triggered destination-based black holing
B. ICMP Unreachable messages
C. Sinkholes
D. A honey pot
E. Traffic scrubbing

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.