Notifications
Clear all
Topic starter
The most common form of child-like attack is to send a large number of seemingly legitimate packets to the target host through Flood, which ultimately leads to network bandwidth.
Or the equipment resources are exhausted .
Which of the following options is not included in traffic attack packets?
- A . TCP packets
B. UDP packet
C. ICMP message
D. FTP message
Suggested Answer: D
Posted : 01/11/2022 7:31 pm