A security administrator sees several hundred entries in a web server security log that are similar to the following:
The network source varies, but the URL, status, and user agent are the same. Which of the following would BEST protect the web server without blocking legitimate traffic?
b49eb27
7 months agob49eb27
7 months agoElDirec
9 months, 1 week agoCraZee
9 months, 2 weeks agoOdinAtlasSteel
11 months, 1 week agoweaponxcel
1 year ago32d799a
1 year ago