Which of the following are effective protective or countermeasures against a distributed denial-of-service attack?
Which of the following protocols work in the following layers: application, data link, network, and transport?