Which of the following can be applied as countermeasures against DDoS attacks?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following is used as a default port by the TELNET utility?
A scenario involves a pool of users with private IP addresses who need to access the Internet; however, the company has a limited number of IP addresses and needs to ensure users occupy only one public IP address.
Which technology is used to allow a pool of users to share one global IP address for Internet access?
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.