Which of the following is an example of a denial-of-service attack?

A. Clicking a link in an e-mail that happens to contain malware
B. Installing a keylogger on a system in an attempt to collect usernames and passwords
C. Flooding a system with ping requests in an attempt to take it down
D. View medical records to satisfy one's curiosity


Answer: C
Explanation: Flooding a system with ping requests is an example of a denial-of-service attack. Installing a keylogger to collect usernames and passwords is an example of an unauthorized access or use. Viewing medical records for curiosity is an example of inappropriate use.

Computer Science & Information Technology

You might also like to view...

The first row in a data source is called the ________ row

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the mode options opens a file in append mode, allowing for both reading and writing while preserving any preexisting text.

A. w B. w+ C. a D. a+

Computer Science & Information Technology

____ is a Web site for uploading and storing digital photographs.

A. Facebook B. Flickr C. YouTube D. Wikipedia

Computer Science & Information Technology

Case Based Critical Thinking QuestionsCase 6-1Carlos has created several tables for his Organic Produce farm database including Customers, Vendors, and Products. Now he wants to create forms that will make it easier to enter data in the database. Determine the best methods for Carlos to use when creating forms for his specific needs. The new custom form meets Carlos' requirements; however, some of the labels do not clearly describe the data that needs to be entered in the form.  Which label property should Carlos change to make the label more descriptive and clear to the user?

A. Content property B. Visible property C. Special Effect property D. Caption property

Computer Science & Information Technology