Author Question: In a _______ attack the attacker creates a series of DNS requests containing the spoofed source ... (Read 103 times)

LaDunn

  • Hero Member
  • *****
  • Posts: 526
In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.
 
  A. SYN flood B. DNS amplification
   C. poison packet D. UDP flood

Question 2

A characteristic of reflection attacks is the lack of _______ traffic.
 
  A. backscatter B. network
   C. three-way D. botnet



shaikhs

  • Sr. Member
  • ****
  • Posts: 312
Answer to Question 1

B

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

In 2010, opiate painkllers, such as morphine, OxyContin®, and Vicodin®, were tied to almost 60% of drug overdose deaths.

Did you know?

As the western states of America were settled, pioneers often had to drink rancid water from ponds and other sources. This often resulted in chronic diarrhea, causing many cases of dehydration and death that could have been avoided if clean water had been available.

Did you know?

Congestive heart failure is a serious disorder that carries a reduced life expectancy. Heart failure is usually a chronic illness, and it may worsen with infection or other physical stressors.

Did you know?

Eating food that has been cooked with poppy seeds may cause you to fail a drug screening test, because the seeds contain enough opiate alkaloids to register as a positive.

Did you know?

The liver is the only organ that has the ability to regenerate itself after certain types of damage. As much as 25% of the liver can be removed, and it will still regenerate back to its original shape and size. However, the liver cannot regenerate after severe damage caused by alcohol.

For a complete list of videos, visit our video library