Which of the following is NOT a means to implement a Denial of Service (DoS) attack?

A. Initiate a firmware update, and then interrupt the process.
B. Make numerous repeated requests for bulky resources.
C. Transmit significant volumes of random traffic to a target.
D. Send dozens of email solicitation messages to an organization.


Answer: D. Send dozens of email solicitation messages to an organization.

Computer Science & Information Technology

You might also like to view...

What does it mean when we say a sorting algorithm is “stable”?

a. It means the algorithm does not change the order of elements if they are equal (not needed to be replaced) b. It means that the algorithm has the same complexity in all scenarios c. It means that the algorithm always works d. None of the above

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 4-1Shay has come to ask you some questions about a few new projects he is developing because he knows that you know a lot about floating layouts, and he wants some guidance. Shay wants to create a Web site for himself with the main requirement being that the layout change size when the user's browser displays font size changes, but will not change when the browser window is resized. Which of the following do you recommend to him?

A. fixed-width B. indexed C. liquid D. elastic

Computer Science & Information Technology

How do you initialize a C-string called Cheer which will contain “Hooray” (without the quotes.) ?

A. char Cheer[7] = {‘H’, ‘o’, ‘o’, ‘r’, ‘a’, ‘y’, ‘\0’}; B. char Cheer[7] = “Hooray”; C. char cheer[7] = “Hooray”; D. A and B

Computer Science & Information Technology

The OSI networking model has ____________________ layers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology