An attackers can create an …....attack by sending hundreds or thousand of e-mail with
very large attachment.
a. Connection Attack
b. Auto responder Attack
c. Attachment overloading Attack
d. All of the above
very large attachment.
a. Connection Attack
b. Auto responder Attack
c. Attachment overloading Attack
d. All of the above