In a ____ attack, a hacker sends to the target computer a packet that has the identical source and destination IP address as that of the target computer.?

A. DNS overflow?
B. ?Teardrop
C. ?Land
D. ?Chargen


Answer: C

Computer Science & Information Technology

You might also like to view...

____ is a popular music format limited to instrumental music, and cannot be used for general sounds.

A. WAV B. MP3 C. AIFF D. MIDI

Computer Science & Information Technology

Name one of the four things Krug recommends doing to make text more scannable.

What will be an ideal response?

Computer Science & Information Technology

In order to help protect computer systems, installing Microsoft Office updates are not needed as long as you have firewall software installed

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following commands can be used to trace an IPv6 route? (Choose two.)

A. trace6 B. traceroute6 C. tracert6 D. tracepath6

Computer Science & Information Technology