A(n) ____________________, is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it shuts down or simply can no longer handle requests, causing legitimate users to be denied service.
Fill in the blank(s) with the appropriate word(s).
DoS attack
Computer Science & Information Technology
You might also like to view...
What KPA at the defined level establishes and assigns responsibilities for refining an organization's software processes?
A. Organization process definition B. Integrated software management C. Training program D. Organization process focus
Computer Science & Information Technology
Which of the following What-If analysis tools is an add-in?
A) Goal Seek B) PivotTable C) Solver D) Scenario Manager
Computer Science & Information Technology
Style rules are prioritized by their specificity or ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The virtualswitch is a software function of Hyper-V that is responsible for layer ________ switching
a. 2 b. 3 c. 4 d. None of the above
Computer Science & Information Technology