SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start


From course:

CISSP

» Start this Course
(Practice similar questions for free)
Question:

Fraggle Attack. A fraggle attack uses UDP messages that are modified to appear to have the source address of the system being targeted.

Author: John Intindolo



Answer:

Which type of attack uses spoofed UDP packets in an attempt to overwhelm a target system? - Fraggle attack - Teardrop attack - Smurf attack - SYN flood attack


0 / 5  (0 ratings)

1 answer(s) in total