Which two statements about ping flood attacks are true? (Choose two.)
A . They use ICMP packets.
B . The attack is intended to overwhelm the CPU of the target victim.
C . They attack by sending ping requests to the return address of the network.
D . They use SYN packets.
E . They attack by sending ping requests to the broadcast address of the network.
F . They use UDP packets.
Latest 400-251 Dumps Valid Version with 124 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund