PdfPrep.com

Which TCP/IP application protocol can be used in an amplification attack by exploiting the protocol weakness in recursive lookup?

Which TCP/IP application protocol can be used in an amplification attack by exploiting the protocol weakness in recursive lookup?
A . HTTPS
B . LDAP
C . HTTP
D . DNS
E . SMTP

Answer: D

Exit mobile version