Which of the following is similar to a smurf attack, but uses UDP instead to ICMP?
A. X-Mas attack
B. Fraggle attack
C. Vishing
D. Man-in-the-middle attack
Answer: B. Fraggle attack
You might also like to view...
hiding data from outside entities (the way the private section of a class hides data from the main program) describes ___________________.
A. encapsulation B. maintenance C. poor programming practice D. invisibility
Discuss the extended capabilities or services that a DDBMS must provide over a centralized DBMS.
What will be an ideal response?
You can click ________ in Word Options to rename a tab
A) Add-Ins B) Quick Access Toolbar C) Customize Ribbon D) Display
What combination of the following options will protect S3 objects from both accidental deletion and accidental overwriting?
A. Enable S3 versioning on the bucket. B. Access S3 data using only signed URLs. C. Disable S3 delete using an IAM bucket policy. D. Enable S3 Reduced Redundancy Storage. E. Enable multi-factor authentication (MFA) protected access.