________ floods a computer with requests until it shuts down and refuses to answer any requests for information
A) A polymorphic virus B) Pretexting
C) A Trojan horse D) A DDoS attack
D
You might also like to view...
Which of the following would be the most appropriate to use to locate a specific file or app?
A) Windows Defender B) Switch list C) File Explorer D) Internet Explorer
Match the following terms with their description
I. File Explorer II. Window III. Ribbon IV. Title bar V. Address bar A. Contains control buttons to minimize, maximize, restore down, and close a window B. A rectangular frame that displays a program, folder, or file C. Formerly known as Windows Explorer D. Includes Back and Forward buttons in File Explorer E. Allows users to interact with the operating system using tabs at the top of the File Explorer screen
You can move to the previous or next sheet by pressing the ____ keys.
A. Alt + Page Up or Alt + Page Down B. Ctrl + Page Up or Ctrl + Page Down C. Tab + Page Up or Tab + Page Down D. F4 + Page Up or F4 + Page Down
Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.
Answer the following statement true (T) or false (F)