A ____ attack is designed to prevent a device from performing its intended function.
A. denial-of-service (DoS)
B. rogue AP
C. phishing
D. pharming
Answer: A
Computer Science & Information Technology
You might also like to view...
________ fonts are generally used for large amounts of text such as reports and papers
Fill in the blank(s) with correct word
Computer Science & Information Technology
Two users cannot work on the same table in a database
Indicate whether the statement is true or false
Computer Science & Information Technology
A(n) ____________________ consists of rows and columns that form cells, and is used to organize information in a document.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
If you wanted the most freedom in creating a report you would use the ________ tool.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology