A security administrator is observing congestion on the firewall interfaces and a high number of half open incoming connections from different external IP addresses. Which of the following attack types is underway?

A. Cross-site scripting
B. SPIM
C. Client-side
D. DDoS


Ans: D. DDoS

Computer Science & Information Technology

You might also like to view...

The ____________ method can be used to convert a string to an int.

a. int.Parse b. Parse.int c. Parse.ToString.int d. ToString.Parse.int

Computer Science & Information Technology

The minimize button, maximize button, and close button on a window are sometimes referred to as:

A) operations buttons B) sizing buttons C) decorations D) display buttons

Computer Science & Information Technology

You can place any large block of text within a _____ section to avoid inadvertently inserting a character that would be misinterpreted by an XML processor (such as the ampersand symbol).

A. baseline B. header C. CDATA D. pcdata

Computer Science & Information Technology

When using Track Changes, user changes are displayed in balloons of different ________

Fill in the blank(s) with correct word

Computer Science & Information Technology