Which of the following attacks is generally initiated from a botnet?

A. Cross site scripting attack
B. HTTP header injection
C. Distributed denial of service
D. A war driving attack


Answer: C. Distributed denial of service

Computer Science & Information Technology

You might also like to view...

Revise the method getPointerTo so that it does not use the local variable result, but instead executes a return statement after each test is completed.

What will be an ideal response?

Computer Science & Information Technology

Write a SELECT statement to list course data sorted by course number.

What will be an ideal response?

Computer Science & Information Technology

Describe the most common ways of gaining unauthorized access to a network-based computer.

What will be an ideal response?

Computer Science & Information Technology

What measures the actual time that a processor spends working on a task?

A) Processor Time B) PID Time C) Resource Time D) CPU Time

Computer Science & Information Technology