Which two statements about ping flood attacks are true? (Choose two.)

Which two statements about ping flood attacks are true? (Choose two.)
A . They use ICMP packets.
B . The attack is intended to overwhelm the CPU of the target victim.
C . They attack by sending ping requests to the return address of the network.
D . They use SYN packets.
E . They attack by sending ping requests to the broadcast address of the network.
F . They use UDP packets.

Answer: AE

Latest 400-251 Dumps Valid Version with 124 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments