A. policy based routing (PBR) B. unicast reverse path forwarding (uRPF) C. lock and keyACL D. RFC 1918filtering E. IP source routing
A. Man-in-themiddle attack B. Spoof attack C. Land.C attack D. Buffer Overflow E. Day zero attack F. Trojan Horse
A. Blind connection-reset B. Large packet echo request C. Packet fragmentation offset D. Broadcast-based echo request E. Excessive bandwidth consumption