Identify which of the following is NOT a TCP/IP Attack: Question 5 options: a) SQL Injection b) Source Routing Attack c) IP Spoofing Attack d) SYN Flood Attack The software-based access control that identifies data items that require different types of protection is: Question 8 options: a) encryption b) need to know c) internal security labeling d) integrity checking A point of presence system that analyzes network traffic to detect leaking data is: Question 19 options: a) a data loss prevention system b) an intrusion detection system c) an intrusion prevention system d) a DMZ Solution 5) a) SQL Injection 8) c) internal security labeling 19) a) a data loss prevention system .