A characteristic of reflection attacks is the lack of _______ traffic.
A. backscatter B. network
C. three-way D. botnet
A. backscatter
Computer Science & Information Technology
You might also like to view...
What format is used to show I/O addresses?
A) Binary B) Alphanumeric C) Decimal D) Hexadecimal
Computer Science & Information Technology
Which of the following is used to embed the MAC address of an Ethernet interface in a corresponding IPv6 address?
A. Subnet B. IANA prefix C. EUI-64 D. Site-local
Computer Science & Information Technology