Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?
a. MAC address spoofing
b. denial-of-service attack
c. DNS poisoning
d. rogue DHCP server
ANSWER: b
You might also like to view...
Why do we use functions?
What will be an ideal response?
The ____ in a two-dimensional array specify the variable's row and column positions in the array.
A. array scripts B. array pointers C. subscripts D. superscripts
Which of the following statements about wound-wait and wait-die deadlock prevention strategies is true?
a) The wound-wait deadlock prevention strategy prevents deadlock by denying the wait-for condition. b) The wait-die deadlock prevention strategy breaks deadlock by denying the no-preemption condition. c) In the wound-wait strategy, as a process ages, it will wait less often. d) In the wait-die strategy, as a process ages, it will wait less often.
The tab in which video Start options are found
A) Design B) Format C) Playback