Complete the code to identify the first step in DDoS protection.
The initial step in DDoS protection is to [1] incoming traffic to detect unusual patterns.
The first step is to monitor traffic to identify abnormal spikes that may indicate a DDoS attack.
Complete the code to specify a common method to filter malicious traffic.
A common method to filter malicious traffic is to use [1] lists that block known bad IP addresses.Using blacklists helps block IP addresses known to be sources of attacks.
Fix the error in the description of a DDoS mitigation technique.
One effective technique is [1] routing, which distributes traffic across multiple servers to avoid overload.Anycast routing sends traffic to multiple locations, helping balance load and mitigate DDoS attacks.
Fill both blanks to complete the description of rate limiting in DDoS protection.
Rate limiting controls the [1] of requests a user can make and [2] excessive traffic from a single source.
Rate limiting sets the number of allowed requests and blocks traffic exceeding that limit to prevent overload.
Fill all three blanks to complete the description of a layered DDoS defense strategy.
A layered defense includes [1] filtering, [2] detection, and [3] response to attacks.
Layered defense uses traffic filtering, anomaly detection, and automated response to quickly and effectively stop attacks.