Hackers often use a botnet to launch a ____, or a bombardment of network traffic or messages designed to overload a server.?

A. ?TCP/IP attack
B. ?denial of service (DoS) attack
C. ?Theft by computer
D. ?Trojan horse attack


Answer: B

Computer Science & Information Technology

You might also like to view...

To show the year using four digits, such as 2014, you would enter ________ for the custom code format

A) YY B) YYY C) YYYYY D) YYYY

Computer Science & Information Technology

The cell ________ is the shading applied to a cell

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The column feature is often used to create the layout for brochures.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The purpose of computer-aided manufacturing (CAM) is to reduce the time designers spend developing products.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology