Go back to EX0-106 - SCNS Tactical Perimeter Defense

Question :-

If you configure an access-list to block the following networks, what are you trying to protect against? Network 127.0.0.0/8, Network 0.0.0.0/0 Network 10.0.0.0/8 Network 172.16.0.0/16, and Network 168.0.0/16.
You are trying to protect against hijacking
You are trying to protect against spoofing
You are trying to protect against sniffing
You are trying to protect against splicing
You are trying to protect against capturing

Want to practice for EX0-106 - SCNS Tactical Perimeter Defense ? Click here.