Which type of attack can exploit design flaws in the implementation of an application without going noticed?

Which type of attack can exploit design flaws in the implementation of an application without going noticed?
A. Volume-based DDoS attacks.
B. application DDoS flood attacks.
C. DHCP starvation attacks
D. low-rate DoS attacks

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.