Which of the following type of attacks tricks Internet routers into attacking a target?

a. Denial of service attack
b. Distributed denial of service attack
c. Distributed reflection denial of service attack
d. Smurf attack


ANS: C

Computer Science & Information Technology

You might also like to view...

The sharing of physical hardware by many organizations in the cloud, termed pooling, is accomplished with ____________.

A. visualization B. provisioning C. virtualization D. segmentation= E. separation

Computer Science & Information Technology

Which search strategy should you use to search for a specific phrase?

a. Use quotation marks around the phrase b. Use asterisks around the phrase c. Include Boolean operators in the phrase d. Use a wild card around the phrase

Computer Science & Information Technology

Each small element that is recorded by a photo detector is called a picture element or ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

An image map consists of several different images that all link to the same place

Indicate whether the statement is true or false

Computer Science & Information Technology