Which of the following attacks attempts to prevent legitimate users from accessing resources?

A. IP spoofing attack
B. Denial-of-service attack
C. Rogue code attack
D. Social engineering attack


Answer: B
Explanation: A denial-of-service attack targets the resource availability by using up all the available bandwidth in an attempt to prevent authorized users from accessing resources.

Computer Science & Information Technology

You might also like to view...

If a frame with a pixel aspect ratio of 1.2 is displayed on a device using a pixel aspect ratio of 1.0, the image will be _____.

A. stretched horizontally B. stretched vertically C. cropped at the left and right edges D. cropped at the top and bottom E. displayed correctly

Computer Science & Information Technology

The three main operating systems today are Windows, Mac OS, and ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Tags are ________ you can use to add to your content to help with searches

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ divides a selected cell into multiple cells, with a specified number of rows and columns

Fill in the blank(s) with correct word

Computer Science & Information Technology