A(n) ____ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings) to a target device in an attempt to crash or greatly reduce the performance of the target device.
A. SYN flood
B. ICMP flood
C. Ping of Death
D. smurf attack
Answer: B
You might also like to view...
What happens when noise encounters a metal object?
What will be an ideal response?
Case-Based Critical Thinking QuestionsCase 1: MTN OutdoorYou have just started working for MTN Outdoor as a programmer. Your first assignment is to review and correct various code to use sub procedures and/or functions. Which of the following statements would invoke the DisplayMessage Sub procedure?
A. Call DisplayMessage() B. Call DisplayMessage(strItemName, decItemPrice) C. DisplayMessage(strItemName, decItemPrice) D. Call DisplayMessage(strItemName, decItemPrice) As String
The Printer Event1 P1 requests and is allocated the printer R1.2 P1 releases the printer R1.3 P2 requests and is allocated the disk drive R2.4 P2 releases the disk R2.5 P3 requests and is allocated the plotter R3.6 P3 releases the plotter R3. Assume that the events in the accompanying narrative take place. Which of the following statements is true?
A. There is no deadlock. B. Event 4 caused deadlock. C. Event 5 caused deadlock. D. Event 6 caused deadlock.
When Joshua sends a message to Larry, Joshua will use ________ to encrypt the message.
the public key Joshua's public key Larry's public key Larry's private key