Which of the following attack types is being used if the originating IP address has been spoofed?
A. Ping flood
B. Trojan
C. Smurf
D. Worm
Answer: C. Smurf
Computer Science & Information Technology
You might also like to view...
Goal Seek is an example of a ________ tool
A) plotting B) what-if analysis C) charting D) function
Computer Science & Information Technology
A technician is configuring a new DSL router. The technician can communicate with the LAN, but not the WAN. Which of the following is the MOST likely cause?
A. Duplicate IP addresses B. Bad GBIC C. Wrong gateway D. Switching loop
Computer Science & Information Technology