Watch this video on YouTube
In a simulated environment, you are tasked with mitigating a DDoS attack on a corporate website. Which technique would be most effective?