In which of the following attack types does an attacker use compromised PCs with spoofed IP addresses to intensify DDoS attacks on the victims' DNS server by exploiting the DNS recursive method?
A. DoS/DDoS attack
B. DNS server hijacking
C. DNS amplification attack
D. Directory traversal attack
Answer: C. DNS amplification attack
You might also like to view...
The Woman Suffrage Amendment, passed during the period ______, did not lead to their increased representation in politics and government
a. 1840-1890 b. 1890-1940 c. of the era of assimilation d. of the era of separate spheres
Whom do teens say are most influential when it comes to their decisions about sex?
A) parents B) teachers C) siblings D) media
Josephine is a student at Consolidated Community College and is planning to do a study on how eating disorders affect academic performance. Who must review her research before it can be done?
a. the federal government b. the state government c. the American Sociological Association d. the Institutional Review Board e. coworkers
Symbolic interactionism is not as important as functionalism and conflict theory in the study of sport
Indicate whether the statement is true or false