Author Question: ______ attacks are a variant of reflector attacks and also involve sending a packet with a spoofed ... (Read 114 times)

lindiwe

  • Hero Member
  • *****
  • Posts: 577
______ attacks are a variant of reflector attacks and also involve sending a packet with a spoofed source address for the target system to intermediaries.
 
  What will be an ideal response?

Question 2

The best defense against broadcast amplification attacks is to block the use of _______ broadcasts.
 
  What will be an ideal response?



annierak

  • Sr. Member
  • ****
  • Posts: 340
Answer to Question 1

Amplification

Answer to Question 2

IP-directed



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question


 

Did you know?

Human stomach acid is strong enough to dissolve small pieces of metal such as razor blades or staples.

Did you know?

Alcohol acts as a diuretic. Eight ounces of water is needed to metabolize just 1 ounce of alcohol.

Did you know?

Between 1999 and 2012, American adults with high total cholesterol decreased from 18.3% to 12.9%

Did you know?

Normal urine is sterile. It contains fluids, salts, and waste products. It is free of bacteria, viruses, and fungi.

Did you know?

The most dangerous mercury compound, dimethyl mercury, is so toxic that even a few microliters spilled on the skin can cause death. Mercury has been shown to accumulate in higher amounts in the following types of fish than other types: swordfish, shark, mackerel, tilefish, crab, and tuna.

For a complete list of videos, visit our video library