1. One tool used for a denial-of-service attack is ______________. Linux Tribal Flood Network UDP None of the above The attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the victim may be tricked into sending messages to and from itself is a(n) _______________ attack. Teardrop Land myDoom echo-chargen 2 points QUESTION 7 In which type of hacking does the user block access from legitimate users without actually accessing the attacked system? Denial of service Web attack Session hijacking None of the above .