A _____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.
A. rampage
B. mass-mailing
C. denial of service
D. stampede
Answer: C
You might also like to view...
Design several workarounds for the computer printing error. Pretend it’s your term paper and it has to be printed. How would you get around the problem that the computer and the printer aren’t printing?
What will be an ideal response?
Assume a class is to be derived from Jeopardy, e.g., JuniorJeopardy. The new class should inherit all data members. Which key word in the Jeopardy class would need to change to make this possible?
A. public to private B. protected to public C. private to public D. public to protected
As shown in the accompanying figure, specifying the value ____ for the text-decoration property removes the underline from hyperlinks.
A. remove B. blank C. none D. delete
When a merge document is opened, an SQL Update Query is run
Indicate whether the statement is true or false