Implementing Cisco Network Security (IINS v3.0) (#174)

Which type of attack can exploit design flaws in the implementation of an application without going noticed?

volume-based DDoS attacks
DHCP starvation attacks
low-rate DoS attacks
application DDoS flood attacks