Author Question: In a _______ attack the attacker creates a series of DNS requests containing the spoofed source ... (Read 66 times)

LaDunn

  • Hero Member
  • *****
  • Posts: 526
In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.
 
  A. SYN flood B. DNS amplification
   C. poison packet D. UDP flood

Question 2

A characteristic of reflection attacks is the lack of _______ traffic.
 
  A. backscatter B. network
   C. three-way D. botnet



shaikhs

  • Sr. Member
  • ****
  • Posts: 312
Answer to Question 1

B

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

It is important to read food labels and choose foods with low cholesterol and saturated trans fat. You should limit saturated fat to no higher than 6% of daily calories.

Did you know?

Blood is approximately twice as thick as water because of the cells and other components found in it.

Did you know?

Dogs have been used in studies to detect various cancers in human subjects. They have been trained to sniff breath samples from humans that were collected by having them breathe into special tubes. These people included 55 lung cancer patients, 31 breast cancer patients, and 83 cancer-free patients. The dogs detected 54 of the 55 lung cancer patients as having cancer, detected 28 of the 31 breast cancer patients, and gave only three false-positive results (detecting cancer in people who didn't have it).

Did you know?

Disorders that may affect pharmacodynamics include genetic mutations, malnutrition, thyrotoxicosis, myasthenia gravis, Parkinson's disease, and certain forms of insulin-resistant diabetes mellitus.

Did you know?

More than nineteen million Americans carry the factor V gene that causes blood clots, pulmonary embolism, and heart disease.

For a complete list of videos, visit our video library