Computer Science, asked by BrainlyRTX, 1 month ago

Which attack form either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Answers

Answered by gangasulane
1

Explanation:

The DDoS attack uses zombie computers. ... Which attack form either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occuring? Denial of service attack. As the victim of Smurf attack, what protection measure is the most effective during the attack

Similar questions