71. Which option is incorrect about the HTTP Flood defense principle?
HTTP Flood source authentication
URI detection of destination IP
fingerprint learning
load check
Submit