What mitigating steps can help prevent DDoS attacks? (Select all that apply.)
a. Use Mac OS
b. Apply software patches regularly
c. Run antivirus software
d. Implement a firewall
e. Turn on Telnet service
b. Apply software patches regularly
c. Run antivirus software
d. Implement a firewall
Computer Science & Information Technology
You might also like to view...
What is the circulatory system of a business?
a. OSI b. switches c. networking d. information technology
Computer Science & Information Technology
A virtual function is declared by placing the __________ key word in front of the return type in the base class's function declaration.
a. virtual b. private c. public d. protected e. None of these
Computer Science & Information Technology