An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of Service (DDoS) attacks.
Which of the following mitigation strategies should the security administrator implement? (Choose two.)
A . Block all inbound packets with an internal source IP address
B. Block all inbound packets originating from service ports
C. Enable unused Transmission Control Protocol (TCP) service ports in order to create a honeypot
D. Block the use of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) through his perimeter firewall
E. Require the use of X.509 digital certificates for all incoming requests
Answer: D,E
Latest ITS-110 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund