An attacker can create an …………………………….. attack by sending hundreds or thousands of emails
with very large attachment
A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack
D)All of the Above
with very large attachment
A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack
D)All of the Above