Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?
Who are the primary victims of smurf attacks on the contemporary Internet system?
Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?
In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?