Which of the following is a snippet of code designed to automate tasks and often used by attackers to carry out denial-of-service attacks?

A) Ransomware
B) Screen scraper
C) Zero-day exploit
D) Bot


D) Bot

Computer Science & Information Technology

You might also like to view...

FERPA protects which of the following?

A) Medical records B) Educational records C) Personally identifiable information D) Financial records

Computer Science & Information Technology

Which type of DoS generates a flood of EAPOL messages requesting 802.1X authentication?

a. Authentication flood attack b. Deauthentication flood attack c. Network jamming attack d. Equipment destruction attack

Computer Science & Information Technology

Discuss the Web 2.0 tools you might use when creating a Web site for a new business, and explain why you have chosen each tool.

What will be an ideal response?

Computer Science & Information Technology

What is the maximum write throughput I can provision for a single Dynamic DB table?

A. 1,000 write capacity units B. 100,000 write capacity units C. Dynamic DB is designed to scale without limits, but if you go beyond 10,000 you have to contact AWS first. D. 10,000 write capacity units

Computer Science & Information Technology