How do attackers today make it difficult to distinguish an attack from legitimate traffic?

A. by using a common language
B. by using diverse interfaces
C. by using common Internet protocols
D. by using simple scripting


Answer: C

Computer Science & Information Technology

You might also like to view...

A single character of data is roughly equivalent

a. a bit b. a byte c. a computer word d. one megabyte

Computer Science & Information Technology

Which of the following uses a two-way authentication system known as mutual authentication?

A. LDAP B. Kerberos C. RADIUS D. 802.1X

Computer Science & Information Technology

In the function evaluateOpr, two operands are needed to evaluate an operation and operands are saved in the stack.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When referring to Internet protocols, the opposite of proprietary protocols is ________ system protocols.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology