Which two statements about ping flood attacks are true? (Choose two.)
A . They use ICMP packets.
B . The attack is intended to overwhelm the CPU of the target victim.
C . They attack by sending ping requests to the return address of the network.
D . They use SYN packets.
E . They attack by sending ping requests to the broadcast address of the network.
F . They use UDP packets.