Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?

a. MAC address spoofing
b. denial-of-service attack
c. DNS poisoning
d. rogue DHCP server


ANSWER: b

Computer Science & Information Technology

You might also like to view...

Why do we use functions?

What will be an ideal response?

Computer Science & Information Technology

The ____ in a two-dimensional array specify the variable's row and column positions in the array.

A. array scripts B. array pointers C. subscripts D. superscripts

Computer Science & Information Technology

Which of the following statements about wound-wait and wait-die deadlock prevention strategies is true?

a) The wound-wait deadlock prevention strategy prevents deadlock by denying the wait-for condition. b) The wait-die deadlock prevention strategy breaks deadlock by denying the no-preemption condition. c) In the wound-wait strategy, as a process ages, it will wait less often. d) In the wait-die strategy, as a process ages, it will wait less often.

Computer Science & Information Technology

The tab in which video Start options are found

A) Design B) Format C) Playback

Computer Science & Information Technology