Which attack involves sending an ICMP packet to the broadcast address so that it is then sent to the spoofed source address, causing the network to perform a DoS attack on one of more of its member servers?
a. Stack tweaking
b. RST cookies
c. Smurf IP attack
d. None of the above
Answer C.
You might also like to view...
Answer the following statements true (T) or false (F)
1. A reference parameter must have been assigned value before the function call. 2. If a parameter is only being used to give input to a function it should be a value parameter. 3. When a reference parameter is sent to a function, the parameter’s value is copied to the function’s data area. 4. If changes are made to a value parameter in a function, changes are also made to the actual argument in the function call. 5. If changes are made to a reference parameter in a function, changes are made to the actual argument in the function call.
You can use the ____ Tool to draw free-form curves.
a. Line b. Slant c. Curve d. Pencil
On switch SW4, disable every interface with the Interface range command.
What will be an ideal response?
Which of the following are created to meet specific needs such as the number of characters entered into a field?
A) Required fields B) Indexed fields C) Permissions Rules D) Custom Input Masks