GIAC Certified Enterprise Defender GCED Question # 20 Topic 3 Discussion

GIAC Certified Enterprise Defender GCED Question # 20 Topic 3 Discussion

GCED Exam Topic 3 Question 20 Discussion:
Question #: 20
Topic #: 3

Analyze the screenshot below. Which of the following attacks can be mitigated by these configuration settings?

GCED Question 20


A.

A Denial-of-Service attack using network broadcasts


B.

A Replay attack


C.

An IP masquerading attack


D.

A MAC Flood attack


Get Premium GCED Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.