Which attack is mitigated by using Bounce Verification?

Which attack is mitigated by using Bounce Verification?
A. spoof
B. denial of service
C. eavesdropping
D. smurf

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.