Denial of service attacks target which of the following?

A) Availability
B) Integrity
C) Security
D) Confidentiality


A) Availability

Computer Science & Information Technology

You might also like to view...

How are full and differential database backups used?

A. a differential backup is followed by one or more full backups B. full backups copy data that has changed since the last differential backup C. differential backups are usually performed more often than full backups D. differential backups are more resource intensive than full backups

Computer Science & Information Technology

Case E-2Carolyn is a Web designer who is responsible for the home page of a real estate company with branches in all 50 states. The home page should be attractive and functional, allowing potential sellers and buyers to find information quickly. Carolyn has many image files from various real estate properties. She plans to use these images to showcase a different property each week on the home page. You advise Carolyn to store the original copies of the image files in a separate folder, outside the assets folder of your Web site. Why?

A. Helps keep the assets folder free of clutter. B. Ensures that backup copies are available. C. Ensures that you will be able to find a file in its original state. D. All of the above.

Computer Science & Information Technology

Graphics cards connect the system board to secondary storage.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A property of a group that defines it as a security group or a distribution group.

What will be an ideal response?

Computer Science & Information Technology