A company is experiencing a denial of service attack and wants to identify the source IP address of the attacker in real time. Which method is the BEST way to accomplish this?
A. Network sniffer
B. Syslog
C. SNMPv3
D. System logs
A company is experiencing a denial of service attack and wants to identify the source IP address of the attacker in real time. Which method is the BEST way to accomplish this?
A. Network sniffer
B. Syslog
C. SNMPv3
D. System logs