Which of the following attacks attempts to prevent legitimate users from accessing resources?
A. IP spoofing attack
B. Denial-of-service attack
C. Rogue code attack
D. Social engineering attack
Answer: B
Explanation: A denial-of-service attack targets the resource availability by using up all the available bandwidth in an attempt to prevent authorized users from accessing resources.
You might also like to view...
If a frame with a pixel aspect ratio of 1.2 is displayed on a device using a pixel aspect ratio of 1.0, the image will be _____.
A. stretched horizontally B. stretched vertically C. cropped at the left and right edges D. cropped at the top and bottom E. displayed correctly
The three main operating systems today are Windows, Mac OS, and ____________________.
Fill in the blank(s) with the appropriate word(s).
Tags are ________ you can use to add to your content to help with searches
Fill in the blank(s) with correct word
________ divides a selected cell into multiple cells, with a specified number of rows and columns
Fill in the blank(s) with correct word