Which of the following is an example of a denial-of-service attack?

A) Clicking a link in an e-mail that happens to contain malware
B) Installing a keylogger on a system in an attempt to collect usernames and passwords
C) Flooding a system with ping requests in an attempt to take it down
D) Viewing medical records to satisfy one’s curiosity


C) Flooding a system with ping requests in an attempt to take it down

Computer Science & Information Technology

You might also like to view...

Explain the following questions below:

i) Can a server invoked by lightweight procedure calls control the degree of concurrency within it? ii) Explain why and how a client is prevented from calling arbitrary code within a server under lightweight RPC. iii) Does LRPC expose clients and servers to greater risks of mutual interference than conventional RPC (given the sharing of memory)?

Computer Science & Information Technology

Which of the following functions will exclude quartiles 0 and 4 in its calculations?

A) QUARTILE B) PERCENTILE.EXC C) QUARTILE.INC D) QUARTILE.EXC

Computer Science & Information Technology

Using the  ____  app and a microphone, you can record your own sound files.

A. Voice Recorder B. Audio Recording C. Sound Saver D. Audio Capture

Computer Science & Information Technology

iOS was developed by ________ as the operating system for its tablets and smartphones.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology