The correct statement about UDP Flood and TCP Flood attack prevention is: (Multiple Choice)

The correct statement about UDP Flood and TCP Flood attack prevention is: (Multiple Choice)
A . The UDP protocol is connectionless, so it cannot be implemented by source detection.
B. Prevent UDP Flood by analyzing the rules and characteristics of UDP packets sent by a certain host, the rules and characteristics are called fingerprint learning.
C. The fingerprint learning function of UDP packets learns all fields of the packet data segment.
D. UDP and TCP protocols can be implemented through proxy technology.

Answer: AB

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments