A.After the Layer3 header and before Layer2 header B.After the Layer2 header and before Layer3 header C.Within the Layer 3 header D.Before the layer 2 header
A.Site Of Origin SOO. B.SHAM links with OSPF C.BGP cost community D.BGP feature allow-as in E.RPF Reverse Path forwarding. F.Access-list Control in Distance Vector protocol like RIP and EIGRP.
A.Sniffing attack B.Denial of service attack C.Port Scan attack D.Reconnaisance attack E.Spoofing attack