A security analyst notices an unusual amount of traffic hitting the edge of the network. Upon examining the logs, the analyst identifies a source IP address and blocks that address from communicating with the network. Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of different source IP addresses. Which of the following describes this type of attack?
ApplebeesWaiter1122
Highly Voted 1 year, 9 months agoMalkhofash
Most Recent 1 year, 4 months agocyberPunk28
1 year, 4 months agoGamsje
1 year, 9 months agoCastratedMonk
1 year, 10 months ago