Which attack form either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?
Answers
Answered by
1
Explanation:
The DDoS attack uses zombie computers. ... Which attack form either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occuring? Denial of service attack. As the victim of Smurf attack, what protection measure is the most effective during the attack
Similar questions