Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source of the problem?
which an attacker deliberately violates the three-way handshake and opens a large number of half-open TCP connections. The signature of attack for SYN Flood contains: