Which of the following protocols can be used to construct attack messages for special control message attacks? (multiple choice)
A ICMP protocol
B. UDP protocol
C. CIP protocol
D. FTP protocol
A, B, C
Submit