GIAC GPPA Question Answer
Which of the following techniques is used to identify attacks originating from a botnet?
Recipient filtering
BPF-based filter
IFilter
Passive OS fingerprinting
TESTED 12 Jul 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved