Which of the following controls would stop attacks that are carried out by manipulating router route tables?

A.
Authentication
B.
ACLs
C.
Filters
D.
MICs
Explanation:
Hackers send ICMP messages to routers that contain status information.
This status information may indicate that a route is down or congested. Routers
accept these messages without requiring the sender to authenticate. If the router
required authentication, these types of attacks would not be successful.
I choose A
0
0
yep, its A
0
0