I agree with King. The hardest part about defending against a CC attack is being able to identify the malicious requests. That's why option D is the correct answer.
D seems like the right answer. The requests generated by a CC attack are designed to be indistinguishable from normal traffic, which is what makes them so effective.
Christiane
33 minutes agoKarima
2 days agoMadelyn
3 days agoVirgie
4 days agoSherill
7 days agoMinna
13 days agoMargurite
5 days agoKing
20 days agoLashaunda
2 days agoRodolfo
1 months agoSina
9 days agoWerner
14 days agoColette
23 days agoMelita
28 days agoMargurite
1 months ago