In a __________ attack, the attacker keeps asking your server to establish a connection, with the intent of overloading a server with established connections.?

A. smurf?
B. ?SYN flood
C. ?spoof
D. ?ghost


Answer: B

Computer Science & Information Technology

You might also like to view...

Indicates where text is added, deleted, or formatted.

What will be an ideal response?

Computer Science & Information Technology

Double-clicking the Hand tool does what?

What will be an ideal response?

Computer Science & Information Technology

The Ethernet standard dictates how devices transmit data.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____________________ is an edge device, sometime dedicated but often nothing more than a few extra services added to an existing edge router.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology