A network engineer should enable the Rate Limiting feature of a NetScaler system to
mitigate the threat of __________ attack. (Choose the correct option to complete the
sentence.)

A.
reverse proxying
B.
Java decompilation
C.
source code disclosure
D.
brute force logon attacks