A network engineer should enable the Rate Limiting feature of a NetScaler system to mitigate the
threat of ____ attack. (Choose the correct option to complete the sentence.)

A.
reverse proxying
B.
Java decompilation
C.
source code disclosure
D.
brute force logon attacks