You have been asked to configure a signature to block an attack released by a security vulnerability reporting agency. Which two characteristics of the attack must you understand to configure the attack object? (Choose two)
A.
the source IP address of the attacker
B.
the protocol the attack is transported in
C.
a string or regular expression that occurs within the attack
D.
IPv4 routing header
I choose BC