A(n) ____ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings) to a target device in an attempt to crash or greatly reduce the performance of the target device.

A. SYN flood
B. ICMP flood
C. Ping of Death
D. smurf attack


Answer: B

Computer Science & Information Technology

You might also like to view...

What happens when noise encounters a metal object?

What will be an ideal response?

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 1: MTN OutdoorYou have just started working for MTN Outdoor as a programmer. Your first assignment is to review and correct various code to use sub procedures and/or functions. Which of the following statements would invoke the DisplayMessage Sub procedure?

A. Call DisplayMessage() B. Call DisplayMessage(strItemName, decItemPrice) C. DisplayMessage(strItemName, decItemPrice) D. Call DisplayMessage(strItemName, decItemPrice) As String

Computer Science & Information Technology

The Printer Event1         P1 requests and is allocated the printer R1.2         P1 releases the printer R1.3         P2 requests and is allocated the disk drive R2.4         P2 releases the disk R2.5         P3 requests and is allocated the plotter R3.6         P3 releases the plotter R3. Assume that the events in the accompanying narrative take place. Which of the following statements is true?

A. There is no deadlock. B. Event 4 caused deadlock. C. Event 5 caused deadlock. D. Event 6 caused deadlock.

Computer Science & Information Technology

When Joshua sends a message to Larry, Joshua will use ________ to encrypt the message.

the public key Joshua's public key Larry's public key Larry's private key

Computer Science & Information Technology