Which of the following attack types is being used if the originating IP address has been spoofed?

A. Ping flood
B. Trojan
C. Smurf
D. Worm

Answer: C. Smurf

Computer Science & Information Technology

You might also like to view...

Goal Seek is an example of a ________ tool

A) plotting B) what-if analysis C) charting D) function

Computer Science & Information Technology

A technician is configuring a new DSL router. The technician can communicate with the LAN, but not the WAN. Which of the following is the MOST likely cause?

A. Duplicate IP addresses B. Bad GBIC C. Wrong gateway D. Switching loop

Computer Science & Information Technology