ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 66 - H12-724 discussion

Report
Export

The most common form of child-like attack is to send a large number of seemingly legitimate packets to the target host through Flood, which ultimately leads to network bandwidth.

Or the equipment resources are exhausted. Which of the following options is not included in traffic attack packets?

A.
TCP packets
Answers
A.
TCP packets
B.
UDP packet
Answers
B.
UDP packet
C.
ICMP message
Answers
C.
ICMP message
D.
FTP message
Answers
D.
FTP message
Suggested answer: D
asked 18/09/2024
Mark Lalangan
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first