Which of the following is NOT a form of a DoS attack?

A. SYN flood
B. smurf
C DNS reflection
D. tailgating


D
Explanation: Tailgating is a social engineering attack and is not a DoS attack.

Computer Science & Information Technology

You might also like to view...

What is the biggest difference between a computer scientist and a digital forensic investigator?

a. The computer scientist has a college degree. Maybe the investigator has one and maybe she doesn't. b. The investigator needs to know a little about many aspects of how computers work, whereas the computer scientist will know a whole lot about a specialized area of computer science. c. A computer scientist has to know just about everything there is to know about computers. The investigator only needs to know how to dig the dirt out of a file system. d. An investigator is required to have either a private investigator's license or be employed by a law enforcement agency.

Computer Science & Information Technology

Which of the following terms describes the range of color that a device can produce or display, or the range of color a color model can represent?

a. color space b. color profile c. gamut d. color mode

Computer Science & Information Technology

After you install AD CS, you want to begin issuing certificates for the encrypting file system. What should you do first?

A. Modify a certificate template B. Configure enrollment options C. Configure the online responder D. Install the EFS role service

Computer Science & Information Technology

An Excel table can be used as a data source for a mail merge operation.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology