You have become aware of a DoS tool that targets your public Web site which is co?located at an ISP rather than in a DMZ off of your intranet. This DoS tool is present on numerous systems across the Internet, but it has also been discovered on a few intranet clients as well. After analyzing traffic captures, you discover that the DoS tool spoofs its source address in the 10.233.43.10?50 range. Why is your Web server not being affected by this DoS traffic?
A. Ingress filtering
B. Malware scanner on e?mail servers
C. Private IP addresses are being filtered
D. Web server patches
Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)
Security+ Question of the Week (SY0-401) Series
- Security+ Question of the Week: Deploying a Firewall
- Security+ Question of the Week: Flood Guard
- Security+ Question of the Week: iSCSI
- Security+ Question of the Week: Wireless MAC Filtering
- Security+ Question of the Week: Quantitative Analysis
- Security+ Question of the Week: Contracts
- Security+ Question of the Week: System Clock
- Security+ Question of the Week: Security Breach Incident Response
- Security+ Question of the Week: Reduce Electrostatic Discharge
- Security+ Question of the Week: Planting Malware
- Security+ Question of the Week: Network Hardening
- Security+ Question of the Week: Fuzzing
- Security+ Question of the Week: Single Sign?On
- Security+ Question of the Week: Digital Envelope
- Security+ Question of the Week: Confining Communications to a Subnet
- Security+ Question of the Week: DoS Tool
Please support our Sponsors here :