Hackers often use a botnet to launch a ____, or a bombardment of network traffic or messages designed to overload a server.?
A. ?TCP/IP attack
B. ?denial of service (DoS) attack
C. ?Theft by computer
D. ?Trojan horse attack
Answer: B
Computer Science & Information Technology
You might also like to view...
To show the year using four digits, such as 2014, you would enter ________ for the custom code format
A) YY B) YYY C) YYYYY D) YYYY
Computer Science & Information Technology
The cell ________ is the shading applied to a cell
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The column feature is often used to create the layout for brochures.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The purpose of computer-aided manufacturing (CAM) is to reduce the time designers spend developing products.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology