A distributed denial-of-service attack is ________.

a) an attack in which requests are sent from multiple sources to overload a system.
b) an attack on a distributed system that overloads its network communications.
c) a means to counteract the security provided by a firewall.
d) none of the above


a) an attack in which requests are sent from multiple sources to overload a system.

Computer Science & Information Technology

You might also like to view...

Microsoft Office programs use ____dialogs for performing actions such as opening and saving files.

A. client B. common C. applied D. linked

Computer Science & Information Technology

The ends of a(n) ____ path do not connect, thus creating a line or curve.

a. open b. closed c. arc d. S curve

Computer Science & Information Technology

The Different First Page option is located on:

A) the Page Setup dialog box. B) the Insert tab. C) the File menu. D) the Proofing group.

Computer Science & Information Technology

Which term is used for theĀ total time that a user is connected actively to a remote server?

A. connect time B. download speed C. processing speedĀ  D. costing time

Computer Science & Information Technology