How do attackers today make it difficult to distinguish an attack from legitimate traffic?
A. by using a common language
B. by using diverse interfaces
C. by using common Internet protocols
D. by using simple scripting
Answer: C
Computer Science & Information Technology
You might also like to view...
A single character of data is roughly equivalent
a. a bit b. a byte c. a computer word d. one megabyte
Computer Science & Information Technology
Which of the following uses a two-way authentication system known as mutual authentication?
A. LDAP B. Kerberos C. RADIUS D. 802.1X
Computer Science & Information Technology
In the function evaluateOpr, two operands are needed to evaluate an operation and operands are saved in the stack.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When referring to Internet protocols, the opposite of proprietary protocols is ________ system protocols.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology