Exam Name: | Ethical Hacking and Countermeasures V8 | ||
Exam Code: | EC0-350 Dumps | ||
Vendor: | ECCouncil | Certification: | Certified Ethical Hacker |
Questions: | 878 Q&A's | Shared By: | milena |
What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?
You want to use netcat to generate huge amount of useless network data continuously for various performance testing between 2 hosts.
Which of the following commands accomplish this?