Which among the following are the types of threats that are generally observed?
(a) Denial Service
(b) IP source address spoofing
(c) Denial source
(d) Denial Service & IP source address spoofing
This question was addressed to me by my college professor while I was bunking the class.
My doubt stems from System Quality Attributes Discernable At Runtime topic in division Architectural Patterns and Styles of Software Architecture