Author Question: In a _______ attack the attacker creates a series of DNS requests containing the spoofed source ... (Read 96 times)

LaDunn

  • Hero Member
  • *****
  • Posts: 526
In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.
 
  A. SYN flood B. DNS amplification
   C. poison packet D. UDP flood

Question 2

A characteristic of reflection attacks is the lack of _______ traffic.
 
  A. backscatter B. network
   C. three-way D. botnet



shaikhs

  • Sr. Member
  • ****
  • Posts: 312
Answer to Question 1

B

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

People often find it difficult to accept the idea that bacteria can be beneficial and improve health. Lactic acid bacteria are good, and when eaten, these bacteria improve health and increase longevity. These bacteria included in foods such as yogurt.

Did you know?

Many supplement containers do not even contain what their labels say. There are many documented reports of products containing much less, or more, that what is listed on their labels. They may also contain undisclosed prescription drugs and even contaminants.

Did you know?

In 1864, the first barbiturate (barbituric acid) was synthesized.

Did you know?

To prove that stomach ulcers were caused by bacteria and not by stress, a researcher consumed an entire laboratory beaker full of bacterial culture. After this, he did indeed develop stomach ulcers, and won the Nobel Prize for his discovery.

Did you know?

Throughout history, plants containing cardiac steroids have been used as heart drugs and as poisons (e.g., in arrows used in combat), emetics, and diuretics.

For a complete list of videos, visit our video library