How does a SYN flood knock networks offline? Select one: a. By flooding the victim with SYN requests from different machines, thereby requiring the victim's machine to send back TCP replies to every requester b. Taking up bandwidth on the victim's end by exploiting the SYN bit in TCP packets c. Causing a victim client to become burdened by the amount of requests it must process, thereby leaving many connections half-opened and causing legitimate connections to not receive a SYN-ACK d. All of the above {Ans: All of the above}What is the name of the new encryption scheme that is now preferred for wireless networks? Select one: a. WPA b. WAP c. WEP d. WPE {Ans: WPA}Which of the following is not a type of attack that frequently utilizes spoofed e-mail? Select one: a. SPAM b. Virus/Trojan/Malware c. Automated response messages d. All of the above attacks frequently use spoofed e-mail {Ans: All of the above attacks frequently use spoofed e-mail}Which of the following is an example of a reflected Distributed Denial of Service attack? Select one: a. An attack where the attacker sends TCP requests to multiple servers, spoofing the IP address that is being used