ExamQuestions.com

Register
Login
Certified Secure Software Lifecycle Professional (CSSLP) Exam Questions

ISC

Certified Secure Software Lifecycle Professional (CSSLP)

176 / 190

Question 176:

Which of the following techniques is used to identify attacks originating from a botnet? 

Answer options:

A. Passive OS fingerprinting
B. Recipient filtering
C. IFilter
D. BPF-based filter