What mitigating steps can help prevent DDoS attacks? (Select all that apply.)

a. Use Mac OS
b. Apply software patches regularly
c. Run antivirus software
d. Implement a firewall
e. Turn on Telnet service

b. Apply software patches regularly
c. Run antivirus software
d. Implement a firewall

Computer Science & Information Technology

You might also like to view...

What is the circulatory system of a business?

a. OSI b. switches c. networking d. information technology

Computer Science & Information Technology

A virtual function is declared by placing the __________ key word in front of the return type in the base class's function declaration.

a. virtual b. private c. public d. protected e. None of these

Computer Science & Information Technology