Watch this video on YouTube
You are evaluating strategies to defend against distributed denial of service (DDoS) attacks. In this context, what is the most effective protection strategy?