Smurf and Fraggle are examples of what type of attack?

a. Gaining access
b. Bandwidth consumption
c. SYN Flood attack
d. Program and application attacks


ANS: B

Computer Science & Information Technology

You might also like to view...

Which of the following testing exercises are discussion-based only and don’t involve deploying equipment or other resources?

A) Functional exercises B) Full-scale testing C) Tabletop exercises D) Plan audits

Computer Science & Information Technology

In networking terms, the remaining distance that the packet can travel is known as which of the following?

A. time to live (TTL) B. number of hops (NOH) C. offset D. remaining path

Computer Science & Information Technology

When writing a blog using Word 2013, can you include any pictures or video clips with the blog? If yes, how are they stored?

What will be an ideal response?

Computer Science & Information Technology

Which of these is the process of the system giving appropriate resource access to a user?

a. Authentication b. Authorization c. Logging in d. Identification

Computer Science & Information Technology