Requests and _______ are the two different types of SIP messages.
What will be an ideal response?
Question 2
_____ attacks flood the network link to the server with a torrent of malicious packets competing with valid traffic flowing to the server.
What will be an ideal response?