A large-scale traffic surge often involves multiple corrupted devices sending requests that disrupt normal operations. The correct approach involves inspecting incoming data and blocking abnormal volumes before they reach the service. Other approaches, such as reassigning IP addresses, encrypting data at rest, or creating backups, do not specifically counter a large firing of traffic from various endpoints.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of automated detection in preventing resource depletion attacks?
Open an interactive chat with Bash
How does a Distributed Denial of Service (DDoS) attack work?
Open an interactive chat with Bash
What are web application firewalls (WAF) and how do they help in filtering suspicious traffic?