Which of the following is a denial-of-service attack that uses network packets that have been spoofed so that the source and destination address are that of the victim?

a. Fraggle
b. Teardrop
c. Land
d. Smurf


Answer: c. Land

Computer Science & Information Technology

You might also like to view...

The following code should output the even integers from 2 to 100:

``` counter = 2; do { Console.WriteLine(counter); counter += 2; } While (counter < 100); ```

Computer Science & Information Technology

What utility should you use in NetScan Tools if you wanted to determine information about the host computer?

A. Ping B. Whois C. Who Am I D. Traceroute

Computer Science & Information Technology

Which of the following is FALSE about styles?

A) Styles automate the formatting process. B) You can apply a style to any text element in a document. C) Styles tend to make document formatting less consistent. D) When you change the style, you automatically change all text defined by that style.

Computer Science & Information Technology

A teacher from the school where you are a technician has been invited to Vienna, Austria, and wants to take her laptop with her. They have an 802.11n wireless network. What would you suggest to her before she leaves?

A) Buy a new wireless adapter. B) Leave the laptop at home. C) Change the voltage selector on the laptop. D) Do not use the battery while in Vienna.

Computer Science & Information Technology