A characteristic of reflection attacks is the lack of _______ traffic.

A. backscatter B. network

C. three-way D. botnet


A. backscatter

Computer Science & Information Technology

You might also like to view...

If a manager wants to ensure he has current data for decision making, he needs to regularly add new records to the table. The best way to do this is by using a(n) ________ query

A) make table B) update C) append D) delete

Computer Science & Information Technology

The time before the screen saver starts is called the ________ time

A) Start B) Wait C) Pause D) Delay

Computer Science & Information Technology

Hidden text shows on the screen if you click the ________ button in the Paragraph group on the Home tab

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can run a named data macro from within another macro by using what action?

A. ExecuteNamedDataMacro B. ExecuteDataMacro C. RunDataMacro D. PerformDataMacro

Computer Science & Information Technology