_______ can mimic the symptoms of a denial-of-service attack, and the resulting loss in productivity can be no less devastating to an organization.
ICMP traffic
Peak traffic
Fragmented packets
Insufficient bandwidth
Burst traffic
Submit