Exercise
You must print your completed exercise to submit to your instructor. 
Do Not
close this window without printing your exercise or your answers will be lost.
Student's Name: 
Class:
  1. How does a Distributed Denial of Service attack work?

         

  1. Why is it necessary to use anti-spoofing filters?

           

  1. How does reverse trafficking work?

         

  1. Why is a physical DoS attack on a wireless network so hard to track?

         

  1. What is the best way to reduce the probability of a poisoned ARP cache attack?

         

Note: You must print your completed exercise to submit to your instructor.