Which of the following is an example of a denial-of-service attack?
A) Clicking a link in an e-mail that happens to contain malware
B) Installing a keylogger on a system in an attempt to collect usernames and passwords
C) Flooding a system with ping requests in an attempt to take it down
D) Viewing medical records to satisfy one’s curiosity
C) Flooding a system with ping requests in an attempt to take it down
You might also like to view...
Explain the following questions below:
i) Can a server invoked by lightweight procedure calls control the degree of concurrency within it? ii) Explain why and how a client is prevented from calling arbitrary code within a server under lightweight RPC. iii) Does LRPC expose clients and servers to greater risks of mutual interference than conventional RPC (given the sharing of memory)?
Which of the following functions will exclude quartiles 0 and 4 in its calculations?
A) QUARTILE B) PERCENTILE.EXC C) QUARTILE.INC D) QUARTILE.EXC
Using the ____ app and a microphone, you can record your own sound files.
A. Voice Recorder B. Audio Recording C. Sound Saver D. Audio Capture
iOS was developed by ________ as the operating system for its tablets and smartphones.
Fill in the blank(s) with the appropriate word(s).