How do attackers today make it difficult to distinguish an attack from legitimate traffic?

A. by using a common language
B. by using diverse interfaces
C. by using common Internet protocols
D. by using simple scripting

Answer: C

Computer Science & Information Technology

You might also like to view...

?What two RAID types below utilize disk striping with parity, providing protection against one or two drive failures respectively?

A. ?RAID0 B. ?RAID1 C. ?RAID5 D. ?RAID6

Computer Science & Information Technology

The ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.

A. hash function B. encryption function C. mash function D. stash function

Computer Science & Information Technology