A security administrator sees several hundred entries in a web server security log that are similar to the following:
The network source varies, but the URL, status, and user agent are the same. Which of the following would BEST protect the web server without blocking legitimate traffic?
b49eb27
10 months agob49eb27
10 months agoElDirec
1 year agoCraZee
1 year agoOdinAtlasSteel
1 year, 2 months agoweaponxcel
1 year, 3 months ago32d799a
1 year, 3 months ago