Reflect on your experience of performing the simulated attacks. What insights did you gain about the attacks and about security from working on these exercises?
What are the different types of denial-of-service attacks? How do you detect and respond to these types of events?