Which of the following is used to interfere with normal access to network resources by flooding a network with useless information?
A. denial-of-service attack
B. buffer attack
C. Trojan horse
D. worm
Answer: A
Computer Science & Information Technology
You might also like to view...
What must an InDesign user do before starting this lesson?
What will be an ideal response?
Computer Science & Information Technology
What is a good way to previsualize reflections?
What will be an ideal response?
Computer Science & Information Technology
Which of the following commands redistribute EIGRP routes into RIP?
a. redistribute rip metric
Computer Science & Information Technology
?How can routers be used to determine the path of an e-mail?
What will be an ideal response?
Computer Science & Information Technology