Information Technology Reference
In-Depth Information
7.11 Review Questions
1. Explain content poisoning attack.
2. What is Sybil attack? Why is it a serious problem?
3. Describe a possible scenario of buffer map cheating.
4. Why is it possible to launch a DDoS attack using a P2P network?
5. Why does a P2P network facilitate worm propagation?
Search WWH ::




Custom Search