Answer:
The answer is reflective DNS attack
Explanation:
Reflective DNS Attack is used in many distributed DDoS attacks to knock down an internet pipe. The attack is divided in two stages: first the attacker sends lots of requests to one or more legitimate DNS servers while using spoofed source IP of the target person, and then, in the second stage, the DNS server receiving the semi-legitimate requests replies to the spoofed IP, thereby unknowingly lauching an attack on the target computer with responses to requests never sent by the victim.
The shadow cast by the earth is quite a bit larger than the moon
Explanation:
please subscribe to my mom channel please
i request you
Answer:
systems software and application software.
Explanation:
Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system