Which two statements about header attacks are true?(Choose two)
A.
An attacker can leverage an HTTP response header to inject malicious code into
an application
B.
An attacker can execute a spoofing attack by populating the RH0 routing header
subtype with multiple destination addresses
C.
An attacker can use HTTP header attacks to launch a DoS attack
D.
An attacker can use IPv6 Next Header attacks to steal user data an launch
phishing attacks
E.
An attacker can use vulnerabilities in the IPv6 routing header to launch attacks
at the application layer
F.
An attacker can leverage an HTTP response header to write malicious cookies