Which type of attack can exploit design flaws in the implementation of an application without going noticed?
A. Volume-based DDoS attacks.
B. application DDoS flood attacks.
C. DHCP starvation attacks
D. low-rate DoS attacks
Which type of attack can exploit design flaws in the implementation of an application without going noticed?
A. Volume-based DDoS attacks.
B. application DDoS flood attacks.
C. DHCP starvation attacks
D. low-rate DoS attacks