Scenario: Your organization has deployed F5 technology for network layer DoS protection. However, during a recent security review, it was discovered that the system is not adequately blocking SYN flood attacks.
What immediate actions should you take to address this?
Response: