Which of the following is NOT a form of a DoS attack?
A. SYN flood
B. smurf
C DNS reflection
D. tailgating
D
Explanation: Tailgating is a social engineering attack and is not a DoS attack.
You might also like to view...
What is the biggest difference between a computer scientist and a digital forensic investigator?
a. The computer scientist has a college degree. Maybe the investigator has one and maybe she doesn't. b. The investigator needs to know a little about many aspects of how computers work, whereas the computer scientist will know a whole lot about a specialized area of computer science. c. A computer scientist has to know just about everything there is to know about computers. The investigator only needs to know how to dig the dirt out of a file system. d. An investigator is required to have either a private investigator's license or be employed by a law enforcement agency.
Which of the following terms describes the range of color that a device can produce or display, or the range of color a color model can represent?
a. color space b. color profile c. gamut d. color mode
After you install AD CS, you want to begin issuing certificates for the encrypting file system. What should you do first?
A. Modify a certificate template B. Configure enrollment options C. Configure the online responder D. Install the EFS role service
An Excel table can be used as a data source for a mail merge operation.
Answer the following statement true (T) or false (F)