[TABS_R id=7830]
Which of the following technique protects from flooding attacks originated from the valid prefixes (IP addresses) so that they can be traced to its true source?
- Rate Limiting
- Egress Filtering
- Ingress Filtering
- Throttling
[TABS_R id=7830]