Alice, a network security engineer, is helping Bob protect h…

Alice, a network security engineer, is helping Bob protect his company’s web server from SYN flood attacks. She implements a technique that involves sending a specially crafted TCP packet with a unique sequence number to clients attempting to establish a connection. This packet requires the client to respond correctly before the server allocates resources for the connection. What defensive mechanism has Alice implemented to mitigate the risk of SYN flood attacks on Bob’s web server?