A ____ attack automatically directs browsers on many machines to a single web address at roughly the same time, causing so much network traffic to that site that it is effectively shut down to legitimate users.
A. denial-of-use
B. trial-of-service
C. trial-of-use
D. denial-of-service
Answer: D
You might also like to view...
A double or a float variable should not be used as programming flag variables. Why is this so?
What will be an ideal response?
To test for validity, an XML parser must be able to compare your XML document with the ____ rules you set up in the DTD.
A. validity B. integration C. persistence D. interpolation
If you were doing an analysis in a large multinational firm and needed to retrieve from historical data only the countries and boutiques in each country, you would use this technique:
A) Mathematical Summaries. B) Crosstab Queries. C) Nested Queries. D) Grouping Data.
Which What-If Analysis tool would be best at comparing how interest rates affect a monthly car payment?
A) Scenario Manager B) One-variable data table C) Goal Seek D) Two-variable data table