An administrator believes that the web servers are being flooded with excessive traffic from time to time. The administrator suspects that these traffic floods correspond to when a competitor makes major announcements. Which of the following should the administrator do to prove this theory?
A . Implement data analytics to try and correlate the occurrence times.
B . Implement a honey pot to capture traffic during the next attack.
C . Configure the servers for high availability to handle the additional bandwidth.
D . Log all traffic coming from the competitor’s public IP addresses.
Answer: A