Which two statements about ping flood attacks are true? (Choose two.)

Which two statements about ping flood attacks are true? (Choose two.)
A . They use ICMP packets.
B . The attack is intended to overwhelm the CPU of the target victim.
C . They attack by sending ping requests to the return address of the network.
D . They use SYN packets.
E . They attack by sending ping requests to the broadcast address of the network.
F . They use UDP packets.

Answer: AE

Latest 400-251 Dumps Valid Version with 124 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>