Which of the following types of attacks tricks Internet routers into attacking a target?

A) Denial of service attack
B) Distributed denial of service attack
C) Distributed reflection denial of service attack
D) Smurf attack


C) Distributed reflection denial of service attack

Computer Science & Information Technology

You might also like to view...

A _____________ copy of an object is a copy that has references in common with the original object.

a. bit copy b. deep copy c. shallow copy d. none of the above

Computer Science & Information Technology

________ software is used to perform calculations and numerical analyses

A) Word Processing B) Presentation C) Spreadsheet D) Personal information manager

Computer Science & Information Technology

The process that allows conversion of an image to digital data is known as ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Use the ________ dialog box to navigate to the drive on which you will be saving your folders and projects for this chapter

A) Save Form As B) Save Database As C) Save As D) Save Table As

Computer Science & Information Technology