A ________ attack is when a webserver is flooded with application layer web requests.

A. HTTP flood
B. ICMP flood
C. SYN flood
D. HTML flood


A. HTTP flood

Computer Science & Information Technology

You might also like to view...

The Conditional Formatting button is located in the:

A) Cells group on the FORMAT tab. B) Styles group on the FORMAT tab. C) Cells group on the HOME tab. D) Styles group on the HOME tab.

Computer Science & Information Technology

The ________ data type inserts a unique, numeric value when a new record is entered

A) Currency B) Number C) AutoNumber D) Calculated

Computer Science & Information Technology

Which of the following do NOT make VBA code easy to read?

A) Paragraphs B) Comments C) Line breaks D) Indentations

Computer Science & Information Technology

What statement regarding NTFS features is NOT accurate?

A. NTFS supports the use of file compression. B. NTFS is a journaling file system. C. NTFS does not maintain an index of files. D. NTFS supports the POSIX standard.

Computer Science & Information Technology