Which of the following attacks specifically impact data availability?

A. DDoS
B. Trojan
C. MITM
D. Rootkit


Answer: A. DDoS

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 7-1Max wants to save a worksheet as a Web page. What should he do?In the Save As dialog box, Max should save his Excel file as a(n) _____ file type.

A. HTTP B. HTML C. XML D. JS

Computer Science & Information Technology

Press ________ to move the insertion point to the beginning of the document

A) Home B) Ctrl + Home C) Ctrl + <-- D) Ctrl + End

Computer Science & Information Technology

Dan's wallet contains seven bills of the following denominations: three $5 bills, two $10 bills, one $20 bill, and one $50 bill. If Dan selects two bills at random without replacement, determine the probability that he will select two $5 bills.

A.
B.
C.
D.
E.

Computer Science & Information Technology

Ted is a programmer. He uses a desktop to code applications. The means by which Ted interacts with any program on a computer is called the _____.

A. ?user interface B. ?domain server C. ?plug-in D. ?bootstrap

Computer Science & Information Technology