A sophisticated denial of service attack that is spread out to many attacking computer systems is called a ____.

A. DDOS
B. DOS
C. DDOD
D. DOD


Answer: A

Computer Science & Information Technology

You might also like to view...

Using the ____ priority feature, you can later sort according to the importance of the task so you can determine how best to focus your time.

A. instant B. delayed C. built-in D. automatic

Computer Science & Information Technology

Which of the following is not true regarding your voice during a presentation?

A) The volume of your speech is something you can check during your presentation preparations. B) Be interested enough in what you are saying that you do not use a monotone voice to deliver the message. C) You should not ask your audience if they can hear you. D) Practice helps you learn how to project your voice so it is clear.

Computer Science & Information Technology

A technician has been dispatched to a client’s office to diagnose wireless network issues and suspects that channel overlap may be the problem.   Which of the following tools will the technician use to help in determining whether her suspicions are correct?

A. Toner probe B. Cable tester C. Loopback plug D. Wi-Fi analyzer

Computer Science & Information Technology

______ size is the number of bits the processor can interpret and execute at a given time.

A. Word B. Bus C. Byte D. Power

Computer Science & Information Technology