A security analyst notices an unusual amount of traffic hitting the edge of the network. Upon examining the
logs, the analyst identifies a source IP address and blocks that address from communicating with the network.
Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of
different source IP addresses. Which of the following describes this type of attack?
A. DDoS
B. Privilege escalation
C. DNS poisoning
D. Buffer overflow
logs, the analyst identifies a source IP address and blocks that address from communicating with the network.
Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of
different source IP addresses. Which of the following describes this type of attack?
A. DDoS
B. Privilege escalation
C. DNS poisoning
D. Buffer overflow