Author Question: In a _______ attack the attacker creates a series of DNS requests containing the spoofed source ... (Read 97 times)

LaDunn

  • Hero Member
  • *****
  • Posts: 526
In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.
 
  A. SYN flood B. DNS amplification
   C. poison packet D. UDP flood

Question 2

A characteristic of reflection attacks is the lack of _______ traffic.
 
  A. backscatter B. network
   C. three-way D. botnet



shaikhs

  • Sr. Member
  • ****
  • Posts: 312
Answer to Question 1

B

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The average office desk has 400 times more bacteria on it than a toilet.

Did you know?

Always store hazardous household chemicals in their original containers out of reach of children. These include bleach, paint, strippers and products containing turpentine, garden chemicals, oven cleaners, fondue fuels, nail polish, and nail polish remover.

Did you know?

Only 12 hours after an egg cell is fertilized by a sperm cell, the egg cell starts to divide. As it continues to divide, it moves along the fallopian tube toward the uterus at about 1 inch per day.

Did you know?

Tobacco depletes the body of vitamins A, C, and E, which can result in any of the following: dry hair, dry skin, dry eyes, poor growth, night blindness, abscesses, insomnia, fatigue, reproductive system problems, sinusitis, pneumonia, frequent respiratory problems, skin disorders, weight loss, rickets, osteomalacia, nervousness, muscle spasms, leg cramps, extremity numbness, bone malformations, decayed teeth, difficulty in walking, irritability, restlessness, profuse sweating, increased uric acid (gout), joint damage, damaged red blood cells, destruction of nerves, infertility, miscarriage, and many types of cancer.

Did you know?

The U.S. Preventive Services Task Force recommends that all women age 65 years of age or older should be screened with bone densitometry.

For a complete list of videos, visit our video library