Margot is investigating suspicious activity on her network and uses a protocol analyzer to sniff inbound and outbound traffic. She notices an unusual packet that has identical source and destination IP addresses. What type of attack uses this packet type?

A. Fraggle
B. Smurf
C. Land
D. Teardrop

Answer: C. Land

Computer Science & Information Technology

You might also like to view...

A Subdivision Surface modifier…

A. Divides each polygon a given number of times and smooths the resulting surface. B. Adds detail to the model, but doesn't increase the number of polygons. C. Divides the surface of an object into different pieces. D. Reduces the polygon count in the scene, as that increases computer's performance.

Computer Science & Information Technology

Write a SELECT statement to list the last and first names in last name order of students that are currently employed by the firm Electronic Engineers and have last names starting with "G".

What will be an ideal response?

Computer Science & Information Technology