Which attack involves sending an ICMP packet to the broadcast address so that it is then sent to the spoofed source address, causing the network to perform a DoS attack on one of more of its member servers?

a. Stack tweaking
b. RST cookies
c. Smurf IP attack
d. None of the above


Answer C.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. A reference parameter must have been assigned value before the function call. 2. If a parameter is only being used to give input to a function it should be a value parameter. 3. When a reference parameter is sent to a function, the parameter’s value is copied to the function’s data area. 4. If changes are made to a value parameter in a function, changes are also made to the actual argument in the function call. 5. If changes are made to a reference parameter in a function, changes are made to the actual argument in the function call.

Computer Science & Information Technology

You can use the ____ Tool to draw free-form curves.

a. Line b. Slant c. Curve d. Pencil

Computer Science & Information Technology

On switch SW4, disable every interface with the Interface range command.

What will be an ideal response?

Computer Science & Information Technology

Which of the following are created to meet specific needs such as the number of characters entered into a field?

A) Required fields B) Indexed fields C) Permissions Rules D) Custom Input Masks

Computer Science & Information Technology