Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
An engineer is investigating a case of the unauthorized usage of the “Tcpdump†tool. The analysis revealed that a malicious insider attempted to sniff traffic on a specific interface. What type of information did the malicious insider attempt to obtain?
Which two protocols are used for DDoS amplification attacks? (Choose two.)
