Which of the following is used to interfere with normal access to network resources by flooding a network with useless information?

A. denial-of-service attack
B. buffer attack
C. Trojan horse
D. worm


Answer: A

Computer Science & Information Technology

You might also like to view...

What must an InDesign user do before starting this lesson?

What will be an ideal response?

Computer Science & Information Technology

What is a good way to previsualize reflections?

What will be an ideal response?

Computer Science & Information Technology

Which of the following commands redistribute EIGRP routes into RIP?

a. redistribute rip metric b. redistribute eigrp metric <0-16> c. redistribute eigrp metric d. redistribute rip metric <0-16>

Computer Science & Information Technology

?How can routers be used to determine the path of an e-mail?

What will be an ideal response?

Computer Science & Information Technology