An attack that takes advantage of the procedures for initiating a session is known as what type of attack?

A. DNS amplification attack
B. IP spoofing
C. smurf attack
D. SYN flood attack


Answer: D

Computer Science & Information Technology

You might also like to view...

Usually, a problem is reduced by making the value of a(n) ___________________ smaller with each recursive call

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

All of the exceptions you will handle are instances of classes that extend the __________ class.

a. RunTimeException b. IOException c. Error d. Exception

Computer Science & Information Technology

A ____ frame represents the borders of the graphic file, not the InDesign frame that the graphic is placed in.

A. red B. blue C. brown D. green

Computer Science & Information Technology

Dreamweaver includes a(n) FTP interface that keeps your workflow seamless. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology