____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast addressing and other aspects of Internet operation.?

A. ?E-mail bombing
B. ?Spoofing
C. ?Smurfing
D. ?Firewalling


Answer: C

Computer Science & Information Technology

You might also like to view...

The method setRolloverIcon is used to ________.

a. Handle a key event b. Change the button text c. Change the button icon d. All of the above

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 5-1Stacy is in the process of organizing the files and folders on her computer. Stacy has finished organizing her computer. She is concerned that her files are not completely organized in the correct folders. Stacy has decided to create three new subfolders and needs to make duplicates of her files. Stacy needs to ____.

A. cut and paste her files to the new folders B. copy and paste her files to the new folders C. delete the files and then move them from the Recycle Bin D. copy her files to a flash drive

Computer Science & Information Technology

Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable?

A. system restore B. restore point C. recovery point D. steps recorder

Computer Science & Information Technology

In the accompanying figure, item 2 points to an icon at the left of the computer screen, which is the ____.

A. toolbar B. Dock C. Finder D. menu bar

Computer Science & Information Technology