Attacks that are launched from multiple zombie computers at the same time are called ________

A) Trojan horses
B) distributed denial-of-service attacks (DDoS)
C) worms
D) script kiddies


B

Computer Science & Information Technology

You might also like to view...

Why do you think Susan prefers storing the inventory data in Access? What are the advantages to doing so? What are the disadvantages?

What will be an ideal response?

Computer Science & Information Technology

Memory with one 64-bit bus between the CPU and RAM

A. single-channel memory B. memory C. double channel memory D. DDR

Computer Science & Information Technology

Themes are preformatted with fonts and font sizes, but not with the background design and color.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The name of an object must begin with a letter and can contain only letters, numbers, and the underscore character.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology