In a __________ attack, the attacker keeps asking your server to establish a connection, with the intent of overloading a server with established connections.?
A. smurf?
B. ?SYN flood
C. ?spoof
D. ?ghost
Answer: B
Computer Science & Information Technology
You might also like to view...
Indicates where text is added, deleted, or formatted.
What will be an ideal response?
Computer Science & Information Technology
Double-clicking the Hand tool does what?
What will be an ideal response?
Computer Science & Information Technology
The Ethernet standard dictates how devices transmit data.?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A(n) ____________________ is an edge device, sometime dedicated but often nothing more than a few extra services added to an existing edge router.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology