Of what category of attack is a DoS attack an example?

A. bad header information
B. single-packet attack
C. multiple-packet attack
D. suspicious data payload


Answer: C

Computer Science & Information Technology

You might also like to view...

A possible weakness of the second-chance page-replacement strategy is that if the list of pages is short, then an active page that has just moved to the back of the list after having had its referenced bit set off could quickly move to the front of the list and be selected for replacement before its referenced bit is set on. Comment on this phenomenon. Is it an anomaly in second-chance page replacement? Defend your answer carefully.

What will be an ideal response?

Computer Science & Information Technology

Suppose that only 80% of the STUDENT records from Exercise 17.28 have a value for PHONE, 85% for MAJORDEPTCODE, 15% for MINORDEPTCODE, and 90% for DEGREEPROGRAM, and we use a variable-length record file. Each record has a 1-byte field type for each field occurring in the record, plus the 1-byte deletion marker and a 1-byte end-of-record marker. Suppose we use a spanned record organization, where each block has a 5-byte pointer to the next block (this space is not used for record storage).

(a) Calculate the average record length R in bytes. (b) Calculate the number of blocks needed for the file.

Computer Science & Information Technology

A stack is a(n) ____ data structure.

A. FIFO B. FILO C. LIFO D. LILO

Computer Science & Information Technology

As shown in the accompanying figure, all Office programs have a ____ tab, which contains the more frequently used commands.

A. Gallery B. Navigation C. Home D. Quick Options

Computer Science & Information Technology