An attacker who wants to bring a network down will use a(n) _______________ attack that floods the network with more requests than it can handle.
Fill in the blank(s) with the appropriate word(s).
Denial of Service
correct
Computer Science & Information Technology
You might also like to view...
When a baseline is first set, the dates and costs saved with the baseline are the same as the scheduled dates and costs.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
WeFollow is one of several directories of Facebook users.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In motion graphics, cool hues and colors appear to ____________
a. recede into the background b. advance to the foreground c. show attitude d. give a soft muted look
Computer Science & Information Technology
________ Online allows users to saves notes in the form of text, pictures, and links in notebooks
A) PowerPoint B) Excel C) OneNote D) Word
Computer Science & Information Technology