Which of the following is an example of a denial-of-service attack?
A. Clicking a link in an e-mail that happens to contain malware
B. Installing a keylogger on a system in an attempt to collect usernames and passwords
C. Flooding a system with ping requests in an attempt to take it down
D. View medical records to satisfy one's curiosity
Answer: C
Explanation: Flooding a system with ping requests is an example of a denial-of-service attack. Installing a keylogger to collect usernames and passwords is an example of an unauthorized access or use. Viewing medical records for curiosity is an example of inappropriate use.
You might also like to view...
The first row in a data source is called the ________ row
Fill in the blank(s) with correct word
Which of the mode options opens a file in append mode, allowing for both reading and writing while preserving any preexisting text.
A. w B. w+ C. a D. a+
____ is a Web site for uploading and storing digital photographs.
A. Facebook B. Flickr C. YouTube D. Wikipedia
Case Based Critical Thinking QuestionsCase 6-1Carlos has created several tables for his Organic Produce farm database including Customers, Vendors, and Products. Now he wants to create forms that will make it easier to enter data in the database. Determine the best methods for Carlos to use when creating forms for his specific needs. The new custom form meets Carlos' requirements; however, some of the labels do not clearly describe the data that needs to be entered in the form. Which label property should Carlos change to make the label more descriptive and clear to the user?
A. Content property B. Visible property C. Special Effect property D. Caption property