Which type of attack can exploit design flaws in the implementation of an application without going noticed?
A. volume-based DDoS attacks
B. DHCP starvation attacks
C. low-rate DoS attacks
D. application DDoS flood attacks
Which type of attack can exploit design flaws in the implementation of an application without going noticed?
A. volume-based DDoS attacks
B. DHCP starvation attacks
C. low-rate DoS attacks
D. application DDoS flood attacks