MCQs > IT & Programming > Ethical Hacking > Which of the following echo requests is used by a Fraggle attack?

Ethical Hacking MCQs

Which of the following echo requests is used by a Fraggle attack?

Answer

Correct Answer: UDP

Explanation:

Note: This Question is unanswered, help us to find answer for this one

Ethical Hacking Skill Assessment

Overall Skill Level-Poor

Your Skill Level: Poor

Retake Quizzes to improve it

search

Ethical Hacking Skill Assessment

Overall Skill Level-Poor

Your Skill Level: Poor

Retake Quizzes to improve it