_______ can mimic the symptoms of a denial-of-service attack, and the resulting loss in productivity can be no less devastating to an organization.
A.
ICMP traffic
B.
Peak traffic
C.
Fragmented packets
D.
Insufficient bandwidth
E.
Burst traffic
d
ewrer