Denial of service attacks target which of the following?
a. Availability
b. Integrity
c. Security
d. Confidentiality
ANS: A
You might also like to view...
If a recursive module has no code to stop it from repeating, then it is like a(n) __________ loop.
a. For b. While c. infinite d. Do-Until
To which of the following attacks are ACLs most susceptible?
A. smurf B. IP spoofing C. teardrop D. SYN flood
The strState variable should contain two uppercase letters. Which of the following statements determines whether the variable contains a valid state?
A. If strState = "[A-Z][A-Z]" Then B. If strState Like "[A-Z]" Then C. If strState Like "[a-z][a-z]" Then D. If strState Like "[A-Z][A-Z]" Then
If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should you create?
A. Dual B. Cross C. Controlled D. Selective