I'm a little unsure about this one. Is DDoS protection implemented at the network layer or the application layer? I'll have to review my notes to be sure.
I'd definitely go with filing a suspicious transaction report. The bank has clear protocols for these situations, and you want to protect the institution.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Charlene
4 months agoRoselle
5 months agoRebbecca
5 months agoAlison
5 months agoSanjuana
5 months agoTennie
5 months agoJolene
5 months agoJules
5 months agoMaddie
5 months agoStephaine
5 months agoMacy
5 months agoLaquita
5 months agoRonnie
5 months ago