During a(n) ____________________ attack, a malicious user sends a flood of e-mail to the e-mail server.
Fill in the blank(s) with the appropriate word(s).
mail bombing
You might also like to view...
Which of the following is the IPv6 loopback address? (Select all that apply.)
A. FEDC: 00CF: 1234 B. 0000: 0000: 0000: 0000: 0000: 0000: 0001 C. ::1 D. 127.0.0.1
Cascading Style Sheets are made up of sets of formatting attributes called ____.
A. styles B. rules C. codes D. HTML
What will be printed after the following code is executed?
``` String str = "abc456"; int m = 0; while ( m < 6 ) { if (Character.isLetter(str.charAt(m))) System.out.print( Character.toUpperCase(str.charAt(m))); m++; } ``` a. abc456 b. ABC456 c. ABC d. 456
A(n) ________ address is the address that external entities use when communicating with your network
A) ALU B) MAC C) IP D) WAP