In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.

A. denial-of-service
B. distributed denial-of-service
C. virus
D. spam


Answer: A

Computer Science & Information Technology

You might also like to view...

A(n) ____________________ array is defined as any array that has more then one dimension.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____ color matching system is a standardized color reproduction system in which users and printing professionals can make sure colors match without direct contact with one another.

a. LAB color b. PANTONE c. RGB d. CMYK

Computer Science & Information Technology

A(n) ________ control is a control whose data source is a field in the table such as the customer name

Fill in the blank(s) with correct word

Computer Science & Information Technology

In a graph that represents the flight map for the HPAir problem, if a flight exists from city C1 to city C2, then the path from C1 to C2 is called a _______.

a) relation b) neighborhood c) directed path d) connecting path

Computer Science & Information Technology