List of questions
Related questions
Question 66 - H12-724 discussion
The most common form of child-like attack is to send a large number of seemingly legitimate packets to the target host through Flood, which ultimately leads to network bandwidth.
Or the equipment resources are exhausted. Which of the following options is not included in traffic attack packets?
A.
TCP packets
B.
UDP packet
C.
ICMP message
D.
FTP message
Your answer:
0 comments
Sorted by
Leave a comment first