Which action could be used to determine if a host is compromised and flooding traffic onto the network?
Which action could be used to determine if a host is compromised and flooding traffic onto the network? Group of answer choices Unseat and then reconnect the hard drive connectors…