PrepAway - Latest Free Exam Questions & Answers

Category: CISSP (v.5)

Exam CISSP: Certified Information Systems Security Professional (update August 5th, 2017)

The spoofed IP address used by the attacker as the sour…

What sort of attack is described by the following: An attacker has a list of broadcast addresses which it stores
into an array, the attacker sends a spoofed icmp echo request to each of those addresses in series and starts
again. The spoofed IP address used by the attacker as the source of the packets is the target/victim IP
address.


Page 49 of 121« First...102030...4748495051...607080...Last »