A.Starting a Smurf attack B.Conducting social engineering C.Creating a back door D.Launching a DoS attack
A.Authorization B.Confidentiality C.Authentication D.Integrity
A.signature-based B.profile-based C.rule-based D.protocol analysis-based