When an attack is designed to prevent authorized users from accessing a system, it is called what kind of attack?

A. MITM
B. spoofing
C. denial of service
D. blocking


Answer: C

Computer Science & Information Technology

You might also like to view...

Often the ____________________ program is the program that was used to create a file.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is a switching protocol for backbone or label edge routers to optimize packet exchange through creating labels?

A. ISDN B. MPLS C. SONET D. ATM

Computer Science & Information Technology

A final_processing module is added to display a summary showing the count of students in the report. The count must be accumulated in the detail _processing module as each student is processed. The last thing done in the produce report module is to cal! the final_processing module

What will be an ideal response?

Computer Science & Information Technology

To have text automatically flow from one text box to another, the text boxes must be:

a. embedded b. linked c. merged

Computer Science & Information Technology