Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?

A. packet storm
B. broadcast flood
C. smurf attack
D. half-open SYN attack


Answer: C

Computer Science & Information Technology

You might also like to view...

Collectors static method groupingBy with two arguments receives a Function that classifies the objects in the stream and another Collector (known as the ________ Collector).

a. stream b. downstream c. grouping stream d. upsteam

Computer Science & Information Technology

Windows-based operating systems support file-sharing traffic across a network by using which communications protocol?

A. Samba B. Server Message Block (SMB) C. TCP/IP D. FTP

Computer Science & Information Technology

The interview is also a valuable time to explore key ________ concerns, including ergonomic aspects and system usability.

A) color design B) reliability C) human computer interaction (HCI) D) readability

Computer Science & Information Technology

Sizing, spacing, color, and boldfacing are examples of font attributes

Indicate whether the statement is true or false

Computer Science & Information Technology