AMA University Answers
Login
Register
AMA OED
Courses
IT
IT-6205A
It is where the intruder sends...
It is where the intruder sends a ping greater than the actual acceptable size of the packet to the target computer, forcing the computer to freeze or crash.
Flood attack
Ping of Death Attack
Correct
Smurf Attack
Shutdown Attack
Similar IT-6205A questions
It is a critical method for efficient network management.
It is a support protocol used by network devices such as routers to transmit error messages and oper...
It originated as a military term that described strategies to prevent potential adversaries from dis...
It is a comprehensive strategy that helps business processes to restart or proceed despite a securit...
It should be: accurate, timely, complete, verifiable,consistent, available.
Is it true or false. Using encrypted versions of protocols when sensitive information is exchanged s...