In a ____ attack, the attacker sends a large number of connection or information requests to a target in an attempt to overwhelm its capacity and make it unavailable for legitimate users.

A. man-in-the-middle
B. sniffer
C. dictionary
D. denial-of-service (DoS)


Answer: D

Computer Science & Information Technology

You might also like to view...

What does the code in line 1 do?

A. Creates a string called sentence. B. Initializes a string called sentence. C. Both A & B D. Neither. Strings aren’t initialized that way.

Computer Science & Information Technology

Selecting the right programming language for a project depends on

a. who you have working for you and what they know. b. the final requirements for performance and space used. c. the environment of the finished project. d. all of the above

Computer Science & Information Technology

To create a query that includes all customers and only the products that have been purchased would require you to create a(n) ________

A) unmatched query B) query join C) outer join D) inner join

Computer Science & Information Technology

A(n) _____ is an informational website consisting of time-stamped articles in a diary or journal format.?

A. ?blog B. ?reading list C. ?search engine D. ?hub

Computer Science & Information Technology