ethical-hacker video for a company suspects a series of small, intermittent DDoS attacks meant to probe its defenses. Which response strategy should be
A company suspects a series of small, intermittent DDoS attacks meant to probe its defenses. Which response strategy should be prioritized?