Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?
A . The DNS Request Flood attack on the cache server can be redirected to verify the legitimacy of the source
B. For the DNS Reguest Flood attack of the authorization server, the client can be triggered to send DINS requests in TCP packets: to verify The legitimacy of the source IP.
C. In the process of source authentication, fire prevention will trigger the client to send DINS request via TCP report to verify the legitimacy of the source IP, but in a certain process
It will consume the TCP connection resources of the OINS cache server.
D. Redirection should not be implemented on the source IP address of the attacked domain name, and the destination P address of the attacked domain name should be implemented in the wild.
Answer: C
Latest H12-724-ENU Dumps Valid Version with 367 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund