A WAF without customization will protect the infrastructure from which of the following attack
combinations?
A.
DDoS, DNS poisoning, Boink, Teardrop
B.
Reflective XSS, HTTP exhaustion, Teardrop
C.
SQL Injection, DOM based XSS, HTTP exhaustion
D.
SQL Injection, CSRF, Clickjacking