A ____ attack is designed to prevent a device from performing its intended function.

A. denial-of-service (DoS)
B. rogue AP
C. phishing
D. pharming


Answer: A

Computer Science & Information Technology

You might also like to view...

________ fonts are generally used for large amounts of text such as reports and papers

Fill in the blank(s) with correct word

Computer Science & Information Technology

Two users cannot work on the same table in a database

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ____________________ consists of rows and columns that form cells, and is used to organize information in a document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If you wanted the most freedom in creating a report you would use the ________ tool.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology