What do attackers use to launch an attack on a location without the attack coming directly from the attacker’s location?

What do attackers use to launch an attack on a location without the attack coming directly from the attacker’s location?
A. spear phishing
B. malware that is controlled through CnC
C. direct SYN flood attack
D. ping of death

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.