Which type of attack can exploit design flaws in the implementation of an application without going noticed?

Which type of attack can exploit design flaws in the implementation of an application without going noticed?
A. volume-based DDoS attacks
B. DHCP starvation attacks
C. low-rate DoS attacks
D. application DDoS flood attacks

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.