A security team is discussing lessons learned and suggesting process changes after a security breach incident. During the incident, members of the security team failed to report the abnormal system activity due to a high project workload. Additionally, when the incident was identified, the response took six hours due to management being unavailable to provide the approvals needed. Which two steps will prevent these issues from occurring in the future? (Choose two.)
A. here are signs of SYN flood attack, and the engineer should increase the backlog and recycle the oldest half-open TCP connections
B. here are signs of a malformed packet attack, and the engineer should limit the packet size and set a threshold of bytes as a countermeasure
C. here are signs of a DNS attack, and the engineer should hide the BIND version and restrict zone transfers as a countermeasure
D. here are signs of ARP spoofing, and the engineer should use Static ARP entries and IP address-to-MAC address mappings as a countermeasure