A ____ attack automatically directs browsers on many machines to a single web address at roughly the same time, causing so much network traffic to that site that it is effectively shut down to legitimate users.

A. denial-of-use
B. trial-of-service
C. trial-of-use
D. denial-of-service


Answer: D

Computer Science & Information Technology

You might also like to view...

A double or a float variable should not be used as programming flag variables. Why is this so?

What will be an ideal response?

Computer Science & Information Technology

To test for validity, an XML parser must be able to compare your XML document with the ____ rules you set up in the DTD.

A. validity B. integration C. persistence D. interpolation

Computer Science & Information Technology

If you were doing an analysis in a large multinational firm and needed to retrieve from historical data only the countries and boutiques in each country, you would use this technique:

A) Mathematical Summaries. B) Crosstab Queries. C) Nested Queries. D) Grouping Data.

Computer Science & Information Technology

Which What-If Analysis tool would be best at comparing how interest rates affect a monthly car payment?

A) Scenario Manager B) One-variable data table C) Goal Seek D) Two-variable data table

Computer Science & Information Technology