If you experience a denial-of-service attack, you can use firewall logs to determine the _______ from which the attack originated

a. Computer operating system
b. Computer manufacturer
c. IP address
d. None of the above

Answer C. You can use the IP address information to determine who that IP address belongs to.

Computer Science & Information Technology

You might also like to view...

The time between a person pressing the button and the camera taking the picture is called ________

A) tag time B) shutter lag C) shutter delay D) latency

Computer Science & Information Technology

Briefly describe the IPv6 address structure.

What will be an ideal response?

Computer Science & Information Technology