Which of the following is similar to a smurf attack, but uses UDP instead to ICMP?

A. X-Mas attack
B. Fraggle attack
C. Vishing
D. Man-in-the-middle attack


Answer: B. Fraggle attack

Computer Science & Information Technology

You might also like to view...

hiding data from outside entities (the way the private section of a class hides data from the main program) describes ___________________.

A. encapsulation B. maintenance C. poor programming practice D. invisibility

Computer Science & Information Technology

Discuss the extended capabilities or services that a DDBMS must provide over a centralized DBMS.

What will be an ideal response?

Computer Science & Information Technology

You can click ________ in Word Options to rename a tab

A) Add-Ins B) Quick Access Toolbar C) Customize Ribbon D) Display

Computer Science & Information Technology

What combination of the following options will protect S3 objects from both accidental deletion and accidental overwriting?

A. Enable S3 versioning on the bucket. B. Access S3 data using only signed URLs. C. Disable S3 delete using an IAM bucket policy. D. Enable S3 Reduced Redundancy Storage. E. Enable multi-factor authentication (MFA) protected access.

Computer Science & Information Technology