Which of the following is the most effective technique to prevent source IPAddress spoofing?()
- A policy based routing (PBR)
- B unicast reverse path forwarding (uRPF)
- C lock and keyACL
- D RFC 1918filtering
- E IP source routing
Which of the following is the most effective technique to prevent source IPAddress spoofing?()