After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.
What countermeasures could he take to prevent DDoS attacks?
Enable direct broadcasts
Disable direct broadcasts
Disable BGP
Enable BGP
Submit