ISC Exam Questions

Which of the following controls would stop attacks that are carried out by manipulating router route

Which of the following controls would stop attacks that are carried out by manipulating router route tables?

A.
Authentication

B.
ACLs

C.
Filters

D.
MICs

Explanation:
Hackers send ICMP messages to routers that contain status information.
This status information may indicate that a route is down or congested. Routers
accept these messages without requiring the sender to authenticate. If the router
required authentication, these types of attacks would not be successful.