What mitigating steps can help prevent DDoS attacks? (Select all that apply.)

a. Use Mac OS
b. Apply software patches regularly
c. Run antivirus software
d. Implement a firewall
e. Turn on Telnet service


b. Apply software patches regularly
c. Run antivirus software
d. Implement a firewall

Computer Science & Information Technology

You might also like to view...

The height of a wave indicates volume, which is technically called ____.

A. digitized sound B. audio sound C. amplitude D. peak

Computer Science & Information Technology

Output devices are used to enter data for processing.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You can use the ________ to create specialized reports that come preformatted to for name-brand labels such as Avery

A) Label Wizard B) Report Wizard C) Form Wizard D) Mailing Wizard

Computer Science & Information Technology

A(n) ________ is used to specify conditions that determine which records are displayed

A) icon set B) filter C) structured reference D) funnel

Computer Science & Information Technology