If you experience a denial-of-service attack, you can use firewall logs to determine the _______ from which the attack originated
a. Computer operating system
b. Computer manufacturer
c. IP address
d. None of the above
Answer C. You can use the IP address information to determine who that IP address belongs to.
Computer Science & Information Technology
You might also like to view...
The time between a person pressing the button and the camera taking the picture is called ________
A) tag time B) shutter lag C) shutter delay D) latency
Computer Science & Information Technology
Briefly describe the IPv6 address structure.
What will be an ideal response?
Computer Science & Information Technology