A ____ is an e-mail attack in which the attacker routes large quantities of e-mail to the target system hoping to overwhelm the target with so much irrelevant email that legitimate email cannot be used.
A. spam attack
B. mail bomb
C. sniffer
D. cracker
Answer: B
You might also like to view...
For a contiguous selection in a selection list, select the first item, press and hold the ____ key, and then select the last item in the range.
A. Ctrl B. Shift C. Esc D. Alt
Which of the following needs more words to communicate your ideas and may make your presentation seem flat?
A) Passive voice B) Active voice C) Parallel construction D) Beginning bullets with a verb
Once new software has been selected, implementation will include all of these tasks EXCEPT _________.
A. customizing any aspects of the solution needed B. consulting with stakeholders to establish future needs C. training end users D. configuring all of the software's capabilities and options to meet requirements
All wireless network interface card adapters can act as a wireless device probe.
Answer the following statement true (T) or false (F)