Which of the following would be the easiest to use in detection of a DDoS attack?
A.
Performance monitor
B.
Application log
C.
System log
D.
Protocol analyzer
Which of the following would be the easiest to use in detection of a DDoS attack?
Which of the following would be the easiest to use in detection of a DDoS attack?
A.
Performance monitor
B.
Application log
C.
System log
D.
Protocol analyzer