Q: 2
Which type of attack floods a target with ICMP requests?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.