Which of the following is a type of DoS attack?

a. Smurf attack
b. SYN flood attack
c. UDP flood attack
d. All the above


ANS: D

Computer Science & Information Technology

You might also like to view...

A six-dimensional array can be viewed as a mathematical n-tuple of order ____.

A. five B. six C. seven D. ten

Computer Science & Information Technology

Which of the following do you use to identify a frame as scrollable?

A. The Folio Overlays panel B. The New Document dialog box C. The New Article dialog box D. The Pages panel

Computer Science & Information Technology

The item marked ____ in the above figure has the Complex 2 bevel shape.

A. 2 B. 3 C. 4 D. 5

Computer Science & Information Technology

When problems occur with beveled edges, there is always a solution.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology