This attack uses a spoofing technique to carry out the attack. The attacker spoofs the victim’s IP address and sends requests many different servers or devices that respond to that type of re-quest. The devices all then reply back to the victim’s IP address, which is unable to process the overwhelming amount of traffic.

What will be an ideal response?


Reflective/Amplified DOS

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a series of actions that can be used to automate a repetitive task

A) event B) macro C) procedure D) argument

Computer Science & Information Technology

When you use a reference parameter, any passed variable must have an assigned value.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?What is the output of the following code? var x = [4, 7, 11]; ? x.forEach(stepUp); ? function stepUp(value, i, arr) { arr[i] = value + 1; }

A. ?4, 7, 11 B. ?3, 7, 11 C. ?5, 8, 12 D. ?8, 14, 22

Computer Science & Information Technology

A(n) ____ is a collection of an individual's work accessible through a Web site.

A. wiki B. e-portfolio C. blog D. e-diary

Computer Science & Information Technology