Which type of attack can exploit design flaws in the implementation of an application without going noticed?

Posted by: Pdfprep Category: 210-260 Tags: , ,

Which type of attack can exploit design flaws in the implementation of an application without going noticed?
A . Volume-based DDoS attacks.
B . application DDoS flood attacks.
C . DHCP starvation attacks
D . low-rate DoS attacks

Answer: D

Leave a Reply

Your email address will not be published.