To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?

A. Nimda
B. Slammer
C. Love Bug
D. Code Red


Answer: C

Computer Science & Information Technology

You might also like to view...

The Eraser Tool options bar displays a ____ box in which you can choose a shape for erasure.

a. Skew b. Distort c. Mode d. Shape

Computer Science & Information Technology

Which of the following rendering intents works well for business schematics?

a. colorimetric (absolute) b. colorimetric (relative) c. perceptual d. saturated

Computer Science & Information Technology

Describe cut-through forwarding switching.

What will be an ideal response?

Computer Science & Information Technology

The conditional expression in the while statement is enclosed within ____ following the keyword while.

A. slashes B. parentheses C. asterisks D. dashes

Computer Science & Information Technology