During a(n) ____________________ attack, a malicious user sends a flood of e-mail to the e-mail server.

Fill in the blank(s) with the appropriate word(s).


mail bombing

Computer Science & Information Technology

You might also like to view...

Which of the following is the IPv6 loopback address? (Select all that apply.)

A. FEDC: 00CF: 1234 B. 0000: 0000: 0000: 0000: 0000: 0000: 0001 C. ::1 D. 127.0.0.1

Computer Science & Information Technology

Cascading Style Sheets are made up of sets of formatting attributes called ____.

A. styles B. rules C. codes D. HTML

Computer Science & Information Technology

What will be printed after the following code is executed?

``` String str = "abc456"; int m = 0; while ( m < 6 ) { if (Character.isLetter(str.charAt(m))) System.out.print( Character.toUpperCase(str.charAt(m))); m++; } ``` a. abc456 b. ABC456 c. ABC d. 456

Computer Science & Information Technology

A(n) ________ address is the address that external entities use when communicating with your network

A) ALU B) MAC C) IP D) WAP

Computer Science & Information Technology