Subject: Network Security
a) A/An____attack overwhelms a system with numerous ICMP messages to exhaust the target system's resources.
MAC spoofing
ARP cache poisoning
ping flood
IP spoofing
DNS poisoning
b) A worm infecting another system in a LAN or across the network is said to be operating in which phase?
execution
propagation
triggering
dormant
None of the above
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here