Answer:
An ICMP flood attack exploits vulnerabilities in the Internet Control Message Protocol (ICMP) to flood a target with traffic.
An ICMP flood attack exploits vulnerabilities in the Internet Control Message Protocol (ICMP) to flood a target with traffic.
You may be interested in:
Cyber Security Multiple Choice Questions And Answers (MCQs)