Which of the following attack types is being used if the originating IP address has been spoofed?
A. Ping flood
B. Trojan
C. Smurf
D. Worm
Answer: C. Smurf
Computer Science & Information Technology
You might also like to view...
?The degree of rivalry between competitors is low in industries with many equally sized competitors or little differentiation between products.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The + symbol is an example of a(n) ____ operator.
A. arithmetic B. logical C. comparison D. calculation
Computer Science & Information Technology
Video or sound that downloads to a computer continuously to be watched or listened to in real time is called what?
A. wireless content B. cloud computing C. streaming media D. satellite data
Computer Science & Information Technology
What Windows command displays or alters the compression of files on NTFS partitions?
A. compact B. cipher C. doskey D. xpntfs
Computer Science & Information Technology