An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below??

A. ?banner-grabbing attack
B. ?reflective attack
C. ?friendly attack
D. ?IP spoofing attack


Answer: A

Computer Science & Information Technology

You might also like to view...

By using the _________ method to create subreports, you can create and alter the subreport before adding it to the main report

Fill in the blank(s) with correct word

Computer Science & Information Technology

A run-time error occurs because a formula or function does not follow the rules of construction

Indicate whether the statement is true or false

Computer Science & Information Technology

A search algorithm can be used to locate the data to be retrieved from a list.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

As you enter text in a Word document, the information in the ____ changes to reflect the page number for the current position of the insertion point.

A. title bar B. Navigation Pane C. taskbar D. status bar

Computer Science & Information Technology