Author Question: ________ is the process of obscuring an attackers source IP address. A) Backscatter B) Spoofing ... (Read 44 times)

cool

  • Hero Member
  • *****
  • Posts: 570
________ is the process of obscuring an attackers source IP address.
 
  A) Backscatter
  B) Spoofing
  C) IP Flood
  D) None of the above

Question 2

Which of the following is NOT a characteristic of a good business rule?
 
  A) Declarative
  B) Atomic
  C) Inconsistent
  D) Expressible


emsimon14

  • Sr. Member
  • ****
  • Posts: 344
Answer to Question 1

Answer: B

Answer to Question 2

C



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question


 

Did you know?

The first-known contraceptive was crocodile dung, used in Egypt in 2000 BC. Condoms were also reportedly used, made of animal bladders or intestines.

Did you know?

Each year in the United States, there are approximately six million pregnancies. This means that at any one time, about 4% of women in the United States are pregnant.

Did you know?

Hypertension is a silent killer because it is deadly and has no significant early symptoms. The danger from hypertension is the extra load on the heart, which can lead to hypertensive heart disease and kidney damage. This occurs without any major symptoms until the high blood pressure becomes extreme. Regular blood pressure checks are an important method of catching hypertension before it can kill you.

Did you know?

Adult head lice are gray, about ? inch long, and often have a tiny dot on their backs. A female can lay between 50 and 150 eggs within the several weeks that she is alive. They feed on human blood.

Did you know?

The heart is located in the center of the chest, with part of it tipped slightly so that it taps against the left side of the chest.

For a complete list of videos, visit our video library