Answer the following statements true (T) or false (F)
1. The source of the attack is explicitly identified in the classic ping flood attack.
2. Given sufficiently privileged access to the network handling code on a computer system, it is difficult to create packets with a forged source address.
3. SYN-ACK and ACK packets are transported using IP, which is an unreliable network protocol.
4. The attacker needs access to a high-volume network connection for a SYN spoof attack.
5. Flooding attacks take a variety of forms based on which network protocol is being used to implement the attack.
1. True
2. False
3. True
4. False
5. True
You might also like to view...
Which of the following is NOT an example of a synchronous communication?
A) online chat B) podcast C) VoIP phone call D) instant message
In a preorder traversal of a binary tree, after visiting a node and before moving to the right subtree, we must save a pointer to the node so that after visiting the right subtree, we can visit the left subtree.
Answer the following statement true (T) or false (F)