Which TCP/IP application protocol can be used in an amplification attack by exploiting the protocol weakness in recursive lookup?
A. HTTPS
B. LDAP
C. HTTP
D. DNS
E. SMTP
Which TCP/IP application protocol can be used in an amplification attack by exploiting the protocol weakness in recursive lookup?
A. HTTPS
B. LDAP
C. HTTP
D. DNS
E. SMTP