____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast addressing and other aspects of Internet operation.?
A. ?E-mail bombing
B. ?Spoofing
C. ?Smurfing
D. ?Firewalling
Answer: C
Computer Science & Information Technology
You might also like to view...
When you select a chart, Excel displays a Chart Tools contextual tab with three specific tabs: Design, Layout, and Format
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following is not true about protecting your electronic profile?
A) Every time you provide information to a company, that company may enter the information into a database. B) If nothing else, your name, address, and telephone number are available online for others to see. C) One way to keep yourself safe is to set up an alternate e-mail that you only use when you sign up for promotions or website access. D) Filling out forms online gives the recipient more information than you intend.
Computer Science & Information Technology