1. Why do some websites block “ping” requests? Explain whether websites still need to do this.
2. Identify and briefly explain two or more denial-of-service attacks that exploit TCP/IP protocols.
3. Identify and briefly explain two or more attacks on TCP/IP that may route packets to the wrong hosts.
4. Briefly explain the structure and components of a three-part domain name, like www.amawig.com.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here