A well-resourced attacker intends to launch a highly disruptive DDoS attack against a major online retailer. The attacker aims to exhaust all the network resources while keeping their identity concealed. Their method should be resistant to simple defensive measures such as IP-based blocking. Based on these objectives, which of the following attack strategies would be most effective?
Roxane
8 days agoMauricio
12 days agoWilliam
17 days agoRickie
19 days agoKip
9 days agoParis
23 days agoLezlie
24 days agoKaran
2 days agoLatosha
9 days ago