What do attackers use to launch an attack on a location without the attack coming directly from the attacker’s location?
A . spear phishing
B . malware that is controlled through CnC
C . direct SYN flood attack
D . ping of death
Answer: B
What do attackers use to launch an attack on a location without the attack coming directly from the attacker’s location?
A . spear phishing
B . malware that is controlled through CnC
C . direct SYN flood attack
D . ping of death
Answer: B