Extorting money from an Internet service user by threatening to prevent the user from having access to the service is known as a ______ attack.
A. denial-retrial
B. Trojan horse
C. warez
D. denial-of-service
Answer: D
You might also like to view...
What was the significance of the Pure Food and Drug Act of 1906?
a. It was enacted to control narcotic drug trafficking b. It was the first regulatory act regarding drug consumption c. It banned marijuana in 1937 d. It was repealed in 1914
In which case did the U.S. Supreme Court establish the requirement of “effective” counsel for both indigent and nonidigent defendants?
A) Glover v. United States B) Kimmelman v. Morrison C) Strickland v. Washington D) United States v. Cronic
In which of the following court cases did the Supreme Court rule that police agencies seeking to use a GPS tracking device on a vehicle of a person under investigation must first obtain a search warrant?
a. United States v. Jones b. Kyllo v. United States c. Frye v. United States d. Daubert v. Merrell Dow Pharmaceuticals
The majority of searches take place without a warrant.
Answer the following statement true (T) or false (F)