Author Question: In a _______ attack the attacker creates a series of DNS requests containing the spoofed source ... (Read 104 times)

LaDunn

  • Hero Member
  • *****
  • Posts: 526
In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.
 
  A. SYN flood B. DNS amplification
   C. poison packet D. UDP flood

Question 2

A characteristic of reflection attacks is the lack of _______ traffic.
 
  A. backscatter B. network
   C. three-way D. botnet



shaikhs

  • Sr. Member
  • ****
  • Posts: 312
Answer to Question 1

B

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Cucumber slices relieve headaches by tightening blood vessels, reducing blood flow to the area, and relieving pressure.

Did you know?

The heart is located in the center of the chest, with part of it tipped slightly so that it taps against the left side of the chest.

Did you know?

Anti-aging claims should not ever be believed. There is no supplement, medication, or any other substance that has been proven to slow or stop the aging process.

Did you know?

Adult head lice are gray, about ? inch long, and often have a tiny dot on their backs. A female can lay between 50 and 150 eggs within the several weeks that she is alive. They feed on human blood.

Did you know?

Thyroid conditions cause a higher risk of fibromyalgia and chronic fatigue syndrome.

For a complete list of videos, visit our video library