A characteristic of reflection attacks is the lack of _______ traffic.

A. backscatter B. network

C. three-way D. botnet

A. backscatter

Computer Science & Information Technology

You might also like to view...

What format is used to show I/O addresses?

A) Binary B) Alphanumeric C) Decimal D) Hexadecimal

Computer Science & Information Technology

Which of the following is used to embed the MAC address of an Ethernet interface in a corresponding IPv6 address?

A. Subnet B. IANA prefix C. EUI-64 D. Site-local

Computer Science & Information Technology