Which of the following mitigation strategies should the security administrator implement?
An IoT security administrator wishes to mitigate the risk of falling victim to Distributed Denial of Service (DDoS) attacks. Which of the following mitigation strategies should the security administrator implement? (Choose two.)A . Block all inbound packets with an internal source IP address B. Block all inbound packets originating from...