Answer:
Attackers can exploit vulnerabilities in network protocols to disrupt services and launch DoS attacks on back-end components.
Attackers can exploit vulnerabilities in network protocols to disrupt services and launch DoS attacks on back-end components.
You may be interested in:
Web Security MCQs - PART 2