A _____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.

A. rampage
B. mass-mailing
C. denial of service
D. stampede


Answer: C

Computer Science & Information Technology

You might also like to view...

Design several workarounds for the computer printing error. Pretend it’s your term paper and it has to be printed. How would you get around the problem that the computer and the printer aren’t printing?

What will be an ideal response?

Computer Science & Information Technology

Assume a class is to be derived from Jeopardy, e.g., JuniorJeopardy. The new class should inherit all data members. Which key word in the Jeopardy class would need to change to make this possible?

A. public to private B. protected to public C. private to public D. public to protected

Computer Science & Information Technology

As shown in the accompanying figure, specifying the value ____ for the text-decoration property removes the underline from hyperlinks.

A. remove B. blank C. none D. delete

Computer Science & Information Technology

When a merge document is opened, an SQL Update Query is run

Indicate whether the statement is true or false

Computer Science & Information Technology