Margot is investigating suspicious activity on her network and uses a protocol analyzer to sniff inbound and outbound traffic. She notices an unusual packet that has identical source and destination IP addresses. What type of attack uses this packet type?

A. Fraggle
B. Smurf
C. Land
D. Teardrop


Answer: C. Land

Computer Science & Information Technology

You might also like to view...

What tag should you leave out if you want certain information hidden?

a. ``` ``` b. ``` ``` c. ``` ``` d. ``` ```

Computer Science & Information Technology

Which statement about vacuum tubes is NOT accurate?

A) They are similar to light bulbs. B) They seldom need to be replaced. C) They generate a lot of heat when operating. D) They were used in first-generation computers.

Computer Science & Information Technology

Match the following terms to their meanings:

I. Files that can be accessed by all computers on a network A. shared resource II. A device connected to a computer that can be accessed B. encryption by other computers III. Rules that determine who can share network resources C. troubleshoot IV. Scrambling the contents of a message to ensure that only D. permissions the sender can read it V. Analyzing a problem and developing a solution E. Public folder

Computer Science & Information Technology

Each row in an Excel table:

A) represents a Field which can contain an individual piece of data for a record. B) is the sequence in which pages print. C) represents a record. D) is an individual piece of data, such as a last name.

Computer Science & Information Technology