A(n) ____________________, is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it shuts down or simply can no longer handle requests, causing legitimate users to be denied service.

Fill in the blank(s) with the appropriate word(s).


DoS attack

Computer Science & Information Technology

You might also like to view...

What KPA at the defined level establishes and assigns responsibilities for refining an organization's software processes?    

A. Organization process definition B. Integrated software management C. Training program D. Organization process focus

Computer Science & Information Technology

Which of the following What-If analysis tools is an add-in?

A) Goal Seek B) PivotTable C) Solver D) Scenario Manager

Computer Science & Information Technology

Style rules are prioritized by their specificity or ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The virtualswitch is a software function of Hyper-V that is responsible for layer ________ switching

a. 2 b. 3 c. 4 d. None of the above

Computer Science & Information Technology