You are troubleshooting a server outage for Crucial Technologies. During the troubleshooting process you discover that the server is being flooded with traffic from multiple different sources outside the network. What kind of attack is happening?
Operating Systems | |
Security | |
Software Troubleshooting | |
Operational Procedures |