A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.

A. spam
B. phishing
C. DDoS
D. sniff


C. DDoS

Computer Science & Information Technology

You might also like to view...

Describe the purpose of the main steps in the physical design methodology presented in this chapter.

What will be an ideal response?

Computer Science & Information Technology

Explain why businesses have shown a growing interest in data warehousing in recent years.

What will be an ideal response?

Computer Science & Information Technology

Footnotes are formatted in Footnote Text Style; you can modify the style to adjust the format of all footnotes in a document

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is true?

A) PCs typically have 16 I/O addresses numbered 0 through 15. B) Every device must have a unique I/O address. C) I/O addresses are used to allow an adapter to bypass the processor and communicate directly with the RAM chips. D) Similar adapters and devices are assigned the same I/O address.

Computer Science & Information Technology