In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.

A. SYN flood B. DNS amplification

C. poison packet D. UDP flood


B. DNS amplification

Computer Science & Information Technology

You might also like to view...

The strategy that schedules processes based on their group affiliation is generally referred to as _________

A) ?shortest process next ? B) ?fair share scheduling C) ?queuing analysis ? D) ?simulation modeling

Computer Science & Information Technology

A sync-ordered multicast operation is one whose delivery ordering semantics are the same as those for delivering views in a view-synchronous group communication system. In a thingumajig service, operations upon thingumajigs are causally ordered. The service supports lists of users able to perform operations on each particular thingumajig. Explain why removing a user from a list should be a sync-ordered operation.

What will be an ideal response?

Computer Science & Information Technology

What is meant by the term patched-up prototype?

What will be an ideal response?

Computer Science & Information Technology

Double-clicking the layer name opens the Layer Style dialog box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology