Refer to the exhibit.
Which two determinations should be made about the attack from the Apache access logs? (Choose two.)
Click on the arrows to vote for the correct answer
CD.