Which of the following would be used to check whether a DoS attack is taking place from a specific remote subnet?
A. Syslog files
B. Honeypot
C. Network sniffer
D. tracert
Answer: C. Network sniffer
Computer Science & Information Technology
You might also like to view...
The reserved area at the top of each page of a document is called the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
In ____________________, the primary creates a packet of data with the address of the intended terminal and transmits the packet.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology