A distributed denial of service attack can BEST be described as:

A. Invalid characters being entered into a field in a database application.
B. Users attempting to input random or invalid data into fields within a web browser application.
C. Multiple computers attacking a single target in an organized attempt to deplete its resources.
D. Multiple attackers attempting to gain elevated privileges on a target system.


Answer: C. Multiple computers attacking a single target in an organized attempt to deplete its resources.

Computer Science & Information Technology

You might also like to view...

A(n) ____ is what sees and interacts with while using a program.

A. operating environment B. interface environment C. user interface D. user environment

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. In a time-sharing computer, the processor executes user programs in sequence, completing the execution of one program before beginning the next one. 2. On an Ethernet network, computer A can send a message directly to computer B, without any other computer on the network receiving that message. 3. When developing large software projects, it generally takes more time to develop the code than it does to test and maintain it. 4. The Turing Test was proposed by Alan Turing as a means of determining whether an artificially intelligent machine has been constructed. 5. According to the Code of Ethics proposed by the Association for Computing Machinery (ACM), a computer professional is responsible for understanding the potential impact of his or her work and for striving to minimize risks to the public.

Computer Science & Information Technology

Excel applies ____________________ to cells when specified criteria are met, such as when you apply green, bold formatted text to all sales orders greater than $50,000.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The rule that packets not originating from inside your LAN should not be forwarded relates to ___________

a. Servers b. Workstations c. Routers d. Web servers

Computer Science & Information Technology