ICMP flood attacks and Ping of Death attacks are an example of which of the following?
A) Viruses
B) DoS attacks
C) IP spoofing attacks
D) Trojans
B) DoS attacks
You might also like to view...
Displays that use IPS are good in a large room where people may be looking at the display from various angles
Indicate whether the statement is true or false
C provides built-in operations for complete arrays, such as array assignment or array comparison.
Answer the following statement true (T) or false (F)
Which type of firewall keeps track of each network connection established between internal and external systems?
A. packet filtering B. stateful packet inspection C. application layer D. cache server
____ is a block cipher mode in which every plaintext block encrypted with a block cipher is first exclusive-ORed with the previous ciphertext block.
A. CBC B. ECB C. OFB D. CFB