Which of the following attacks specifically impact data availability?
A. DDoS
B. Trojan
C. MITM
D. Rootkit
Answer: A. DDoS
You might also like to view...
Case-Based Critical Thinking QuestionsCase 7-1Max wants to save a worksheet as a Web page. What should he do?In the Save As dialog box, Max should save his Excel file as a(n) _____ file type.
A. HTTP B. HTML C. XML D. JS
Press ________ to move the insertion point to the beginning of the document
A) Home B) Ctrl + Home C) Ctrl + <-- D) Ctrl + End
Dan's wallet contains seven bills of the following denominations: three $5 bills, two $10 bills, one $20 bill, and one $50 bill. If Dan selects two bills at random without replacement, determine the probability that he will select two $5 bills.
A.
B.
C.
D.
E.
Ted is a programmer. He uses a desktop to code applications. The means by which Ted interacts with any program on a computer is called the _____.
A. ?user interface B. ?domain server C. ?plug-in D. ?bootstrap