40.8k views
0 votes
In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across the Internet and thus detectable.

User Temoto
by
4.2k points

1 Answer

3 votes

Answer:

SYN spoofing attacks.

Explanation:

The Spoofing attack is used to access the personal information it is distributed the viruses through infected links or file .The spoofing attacks has redistributed the traffic and the flow control in the denial-of-service attacks.

The SYN spoofing attacks is used the spoofed source in the result of giving response to packet The Spoofing attack is distributed across the Internet also it is detectable

User Bfrog
by
4.9k points