Answer:
The answer is reflective DNS attack
Explanation:
Reflective DNS Attack is used in many distributed DDoS attacks to knock down an internet pipe. The attack is divided in two stages: first the attacker sends lots of requests to one or more legitimate DNS servers while using spoofed source IP of the target person, and then, in the second stage, the DNS server receiving the semi-legitimate requests replies to the spoofed IP, thereby unknowingly lauching an attack on the target computer with responses to requests never sent by the victim.
One which is open source, linux based
Answer: Physical location
Explanation:
If we place records from, different tables in adjacent physical location, it would increases efficiency of a databases as, database consolidates records from previously store in separate files into a common file. Databases are fast and efficient when they are dealing with large data. When all the information is stored in multiple physical location it is also known as distributed database, as physical location helps to provide the physical and logical path and also protect from default locations in the database.