An administrator believes that the web servers are being flooded with excessive traffic from time to time. The
administrator suspects that these traffic floods correspond to when a competitor makes major announcements.
Which of the following should the administrator do to prove this theory?
A.
Implement data analytics to try and correlate the occurrence times.
B.
Implement a honey pot to capture traffic during the next attack.
C.
Configure the servers for high availability to handle the additional bandwidth.
D.
Log all traffic coming from the competitor’s public IP addresses.