A client is asking a penetration tester to evaluate a new web application for availability.
Which of the following types of attacks should the tester use?
A . TCP SYN flood
B . SQL injection
C . xss
D . XMAS scan
Answer: B
A client is asking a penetration tester to evaluate a new web application for availability.
Which of the following types of attacks should the tester use?
A . TCP SYN flood
B . SQL injection
C . xss
D . XMAS scan
Answer: B