A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.

a. denial-of-service attack
b. service level agreement
c. virus
d. spamming
e. scamming


Ans: a. denial-of-service attack

Computer Science & Information Technology

You might also like to view...

When creating a chart from data in a worksheet, the legend data is indicated by:

A) shading the data with a light purple background. B) surrounding the data with a purple border. C) changing font color of the data to red. D) surrounding the data with a red dashed border.

Computer Science & Information Technology

The default printer is indicated by a green square

Indicate whether the statement is true or false

Computer Science & Information Technology

3/6Gbps eSATA devices can have a cable up to _______ feet in length

Fill in the blank(s) with correct word

Computer Science & Information Technology

When implementing the __init__ method in the AbstractBag class, what task should you leave out because it is the responsibility of the subclasses?

A. setting the self.size variable to 0 B. adding items from the source collection C. initializing the self.items variable D. checking if a source collection exists

Computer Science & Information Technology