What do attackers use to launch an attack on a location without the attack coming directly from the attacker’s location?
A. spear phishing
B. malware that is controlled through CnC
C. direct SYN flood attack
D. ping of death
What do attackers use to launch an attack on a location without the attack coming directly from the attacker’s location?
A. spear phishing
B. malware that is controlled through CnC
C. direct SYN flood attack
D. ping of death