ICMP flood attacks and Ping of Death attacks are an example of which of the following?
A) Viruses
B) DoS attacks
C) IP spoofing attacks
D) Trojans
B) DoS attacks
Computer Science & Information Technology
You might also like to view...
You are on a service call to fix a customer's printer when he asks you to help with a network firewall issue. This is not part of your normal responsibilities. What should you do?
A) Call your supervisor to find the best company resource to recommend to the customer. B) Try to solve the issue to the best of your ability. C) Report the user to his supervisor. D) Empathetically tell the customer you cannot and report the request to your supervisor.
Computer Science & Information Technology
Which of the following ports is associated with Net Bios?
A) 21 B) 80 C) 139 D) 443
Computer Science & Information Technology