In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.
A. SYN flood B. DNS amplification
C. poison packet D. UDP flood
B. DNS amplification
Computer Science & Information Technology
You might also like to view...
Primary tables represent the static lists of things that exist in a business such as customers, products, and suppliers. Related tables represent concepts or events
Indicate whether the statement is true or false
Computer Science & Information Technology
The sensitivity report is most often used in science and engineering environments.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology