In a ____ attack, the attacker sends a large number of connection or information requests to a target in an attempt to overwhelm its capacity and make it unavailable for legitimate users.
A. man-in-the-middle
B. sniffer
C. dictionary
D. denial-of-service (DoS)
Answer: D
You might also like to view...
What does the code in line 1 do?
A. Creates a string called sentence. B. Initializes a string called sentence. C. Both A & B D. Neither. Strings aren’t initialized that way.
Selecting the right programming language for a project depends on
a. who you have working for you and what they know. b. the final requirements for performance and space used. c. the environment of the finished project. d. all of the above
To create a query that includes all customers and only the products that have been purchased would require you to create a(n) ________
A) unmatched query B) query join C) outer join D) inner join
A(n) _____ is an informational website consisting of time-stamped articles in a diary or journal format.?
A. ?blog B. ?reading list C. ?search engine D. ?hub