Which of the following attack types is being used if the originating IP address has been spoofed?

A. Ping flood
B. Trojan
C. Smurf
D. Worm


Answer: C. Smurf

Computer Science & Information Technology

You might also like to view...

?The degree of rivalry between competitors is low in industries with many equally sized competitors or little differentiation between products.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The + symbol is an example of a(n) ____ operator.

A. arithmetic B. logical C. comparison D. calculation

Computer Science & Information Technology

Video or sound that downloads to a computer continuously to be watched or listened to in real time is called what?

A. wireless content B. cloud computing C. streaming media D. satellite data

Computer Science & Information Technology

What Windows command displays or alters the compression of files on NTFS partitions?

A. compact B. cipher C. doskey D. xpntfs

Computer Science & Information Technology