A security administrator is observing congestion on the firewall interfaces and a high number of half open incoming connections from different external IP addresses. Which of the following attack types is underway?
A. Cross-site scripting
B. SPIM
C. Client-side
D. DDoS
Ans: D. DDoS
Computer Science & Information Technology
You might also like to view...
The ____________ method can be used to convert a string to an int.
a. int.Parse b. Parse.int c. Parse.ToString.int d. ToString.Parse.int
Computer Science & Information Technology
The minimize button, maximize button, and close button on a window are sometimes referred to as:
A) operations buttons B) sizing buttons C) decorations D) display buttons
Computer Science & Information Technology
You can place any large block of text within a _____ section to avoid inadvertently inserting a character that would be misinterpreted by an XML processor (such as the ampersand symbol).
A. baseline B. header C. CDATA D. pcdata
Computer Science & Information Technology
When using Track Changes, user changes are displayed in balloons of different ________
Fill in the blank(s) with correct word
Computer Science & Information Technology