Denial of service attacks target which of the following?

a. Availability
b. Integrity
c. Security
d. Confidentiality


ANS: A

Computer Science & Information Technology

You might also like to view...

If a recursive module has no code to stop it from repeating, then it is like a(n) __________ loop.

a. For b. While c. infinite d. Do-Until

Computer Science & Information Technology

To which of the following attacks are ACLs most susceptible?

A. smurf B. IP spoofing C. teardrop D. SYN flood

Computer Science & Information Technology

The strState variable should contain two uppercase letters. Which of the following statements determines whether the variable contains a valid state?

A. If strState = "[A-Z][A-Z]" Then B. If strState Like "[A-Z]" Then C. If strState Like "[a-z][a-z]" Then D. If strState Like "[A-Z][A-Z]" Then

Computer Science & Information Technology

If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should you create?

A. Dual B. Cross C. Controlled D. Selective

Computer Science & Information Technology