Which of the following can help you authoritatively trace a network flooding attack?
A.
Your ISP
B.
Firewall logs
C.
Router logs
D.
Ping
Which of the following can help you authoritatively trace a network flooding attack?
Which of the following can help you authoritatively trace a network flooding attack?
A.
Your ISP
B.
Firewall logs
C.
Router logs
D.
Ping