ethical-hacker video for in which of the following attack types does an attacker use compromised PCs with spoofed IP addresses to intensify DDoS attacks on the
In which of the following attack types does an attacker use compromised PCs with spoofed IP addresses to intensify DDoS attacks on the victims’ DNS server by exploiting the DNS recursive method?