An engineer is analyzing a possible compromise that happened a week ago when the company database servers unexpectedly went down. The analysis reveals that attackers tampered with Microsoft SQL Server Resolution Protocol and launched a DDoS attack. The engineer must act quickly to ensure that all systems are protected. Which two tools should be used to detect and mitigate this type of future attack? (Choose two.)
CiscoTester
Highly Voted 2 years, 4 months agoarchbbo
Most Recent 1 month, 1 week agoShammaA
10 months, 1 week agoak_technonet
11 months, 2 weeks agojay_c_an
1 year, 1 month agoDrVoIP
1 year, 2 months agoMedjai89
1 year, 4 months agomasterchief8047
1 year, 4 months agokyle942
1 year, 7 months agoTOLU1985
1 year, 7 months agokyle942
1 year, 7 months agogreeklover84
2 years, 4 months ago