Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer?

A. IP spoofing
B. denial of service
C. DNS Poisoning
D. smurf attack


Answer: D

Computer Science & Information Technology

You might also like to view...

Spam emails make up only a small proportion (<10%) of emails.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

How many times the following code prints "Welcome to C++"?

``` int count = 0; while (count < 10) { cout << "Welcome to C++"; count++; } ``` A. 8 B. 11 C. 10 D. 9 E. 0

Computer Science & Information Technology

Create an object of class String, s1, from namespace Savitch and an object, s2, of class String, s1, from namespace Teague. Use a member function to give to each object a C-string message that tells of which namespace the class is a member.

Given the namespace groupings that contain class definitions: ``` { class String { public: char* fetchString( ); void storeString(char[]); private: char str[ 100 ]; int length; }; } namespace Teague { class String { public: char* fetchString( ); void storeString(char[]); private: char str[ 100 ]; int length; }; } ```

Computer Science & Information Technology

Some situations require a more complicated analysis than can be accomplished using an single conditional modifier or expression. One way of performing more complex conditional testing is through a processing called ____.

A. Nesting B. Concatenation C. Ternary analysis D. None of the above

Computer Science & Information Technology