Multiple Choice
In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.
A) SYN flood
B) DNS amplification
C) poison packet
D) UDP flood
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q15: The best defense against broadcast amplification attacks
Q16: The attacker needs access to a high-volume
Q17: A _ is an action that prevents
Q18: In both direct flooding attacks and _
Q19: A characteristic of reflection attacks is the
Q21: _ is a text-based protocol with a
Q22: Bots starting from a given HTTP link
Q23: When a DoS attack is detected, the
Q24: DoS attacks cause damage or destruction of
Q25: The best defense against being an unwitting