Which two statement about ping flood attacks are true? (Choose two.)
A. They attack by sending ping requests to the return address of the network.
B. They use ICMP packets.
C. They attack by sending ping requests to the broadcast address of the network.
D. The attack is intended to overwhelm the CPU of the target victim.
E. They use SYN packets.