An attacker who wants to bring a network down will use a(n) _______________ attack that floods the network with more requests than it can handle.

Fill in the blank(s) with the appropriate word(s).


Denial of Service

correct

Computer Science & Information Technology

You might also like to view...

When a baseline is first set, the dates and costs saved with the baseline are the same as the scheduled dates and costs.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

WeFollow is one of several directories of Facebook users.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In motion graphics, cool hues and colors appear to ____________

a. recede into the background b. advance to the foreground c. show attitude d. give a soft muted look

Computer Science & Information Technology

________ Online allows users to saves notes in the form of text, pictures, and links in notebooks

A) PowerPoint B) Excel C) OneNote D) Word

Computer Science & Information Technology