c. Ethernet
d. WAN
250. Which of the following protocols provides cellular/mobile wireless security?
a. WSP
b. WTP
c. WTLS
d. WDP
251. In border gateway protocol (BGP), prefix filters help to limit the damage to the routes in which of the following ways?
a. The egress filters of an autonomous system (AS) is matched with the ingress filters of BGP peers.
b. The ingress filters of BGP peers is matched with the ingress filters of an autonomous system (AS).
c. The ingress filters of an autonomous system (AS) is matched with the ingress filters of BGP peers.
d. The egress filters of BGP peers is matched with egress filters of an autonomous system (AS).
252. Which of the following border gateway protocol (BGP) attacks does
a. Peer spoofing and TCP resets
b. Denial-of-service via resource exhaustion
c. Route flapping
d. Session hijacking
Route-flap damping is a method of reducing route flaps by implementing an algorithm that ignores the router sending flapping updates for a configurable period of time. Each time a flapping event occurs, peer routers add a penalty value to a total for the flapping router. As time passes, the penalty value decays gradually; if no further flaps are seen, it reaches a reuse threshold, at which time the peer resumes receiving routes from the previously flapping router.
The other three choices use TTL hack. The Time To Live (TTL) or hop count is an 8-bit field in each IP packet that prevents packets from circulating endlessly in the Internet. TTL is based on the generalized TTL security mechanism (RFC 3682), often referred to as the TTL hack, which is a simple but effective defense that takes advantage of TTL processing. At each network node, the TTL is decremented by one and is discarded when it is reduced to zero without reaching its destination point.
In peer spoofing attack, the goal is to insert false information into a BGP peer’s routing tables. A special case of peer spoofing, called a reset attack, involves inserting TCP RESET messages into an ongoing session between two BGP peers. Examples of countermeasures against peer spoofing and TCP resets include using strong sequence number randomization and TTL hack.
In a denial-of-service attack via resource exhaustion, routers use a large amount of storage for path prefixes. These resources are exhausted if updates are received too rapidly or if there are too many path prefixes to store due to malicious prefixes. Examples of countermeasures against denial-of-service via resource exhaustion attacks include using rate limit synchronization processing, increasing queue length, route filtering, and TTL hack.