PdfPrep.com

Which type of attack can exploit design flaws in the implementation of an application without going noticed?

Which type of attack can exploit design flaws in the implementation of an application without going noticed?
A . Volume-based DDoS attacks.
B . application DDoS flood attacks.
C . DHCP starvation attacks
D . low-rate DoS attacks

Answer: D

Exit mobile version