How do attackers today make it difficult to distinguish an attack from legitimate traffic?
A. by using a common language
B. by using diverse interfaces
C. by using common Internet protocols
D. by using simple scripting
Answer: C
Computer Science & Information Technology
You might also like to view...
?What two RAID types below utilize disk striping with parity, providing protection against one or two drive failures respectively?
A. ?RAID0 B. ?RAID1 C. ?RAID5 D. ?RAID6
Computer Science & Information Technology
The ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.
A. hash function B. encryption function C. mash function D. stash function
Computer Science & Information Technology