A security analyst notices an unusual amount of traffic hitting the edge of the network. Upon examining the logs, the analyst identifies a source IP address and blocks that address from communicating with the network. Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of different source IP addresses. Which of the following describes this type of attack?
ApplebeesWaiter1122
Highly Voted 1 year, 11 months agoMalkhofash
Most Recent 1 year, 6 months agocyberPunk28
1 year, 6 months agoGamsje
1 year, 11 months agoCastratedMonk
2 years ago