Define the following key terms from this chapter, and check your answers in the glossary:
direct DDoS attacks
reflected DDoS attacks
amplification DDoS attacks
phishing
malvertising
Snort
NGIPS
Advanced Malware Protection (AMP)
personally identifiable information (PII)