An intentional action designed to prevent legitimate users from making use of a computer service is called
a. a bombing run.
b. a curtain closer.
c. a denial-of-service attack.
d. an electronic overdose.
e. phreaking.
C
You might also like to view...
A ____ is a program that seems to perform one function while actually doing something else.
A. worm B. bug C. virus D. Trojan horse
Which of the following is not true about the integration of information in an enterprise system?
A) Enterprise computing systems integrate all of the information and applications of an organization across all of the organization's functional divisions. B) A system should be in place for the information to flow from one decision maker to the next in the organization. C) Today, organizations are finding innovative ways to share data and provide customer support using the Internet and the World Wide Web. D) Data is stored and secured in a central location but is shared among divisions.
Match the following cryptography concepts on the left with the correct definitions on the right
1. encryption a. converts data from ciphertext to plaintext 2. decryption b. the parameter that controls the transformation of plaintext into ciphertext or vice versa 3. key c. when encryption or decryption requests are processed from a queue 4. synchronous d. converts data from plaintext to ciphertext 5. asynchronous e. when encryption or decryption occurs immediately
Which of the following is not required in general-list insertion?
A. Insert into an empty list. B. Insert at the beginning of the list. C. Insert at the end of the list. D. Insert a duplicate key. E. Insert in the middle of the list.