Which of the following DoS attacks sends a UDP packet to a random port on the victim’s system?

A) SYN flood
B) Ping of Death
C) Smurf attack
D) UDP flood


D) UDP flood

Computer Science & Information Technology

You might also like to view...

Briefly list the pros and cons of liquid layouts.

What will be an ideal response?

Computer Science & Information Technology

To create a file that can be transferred between platforms, use the ________ file extension

A) .rtf B) .docx C) .potx D) .txt

Computer Science & Information Technology

Aprototypechain ranges from the base object class in the chain, known as thesuperclassdown to the lower classes orsubclasses.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Case Based Critical ThinkingCase 1Brett is working on a logo for his tropical fish shop, The Aquarium Emporium. He wants the first letter of each word to have a wavy, underwater look. Brett has been trying to use a filter, but it doesn't seem to be working. What has he forgotten to do?

A. The type layer needs to be unrasterized before filters will work. B. He needs to convert the type layer to an image layer. C. The edges of the type must be anti-aliased before the characters can be filtered. D. He needs to choose Begin Filter from the Preferences panel.

Computer Science & Information Technology