Watch this video on YouTube
Which of the following best practices should be followed to thwart DoS/DDoS attacks?