A ________ attack is when a webserver is flooded with application layer web requests.
A. HTTP flood
B. ICMP flood
C. SYN flood
D. HTML flood
A. HTTP flood
Computer Science & Information Technology
You might also like to view...
The Conditional Formatting button is located in the:
A) Cells group on the FORMAT tab. B) Styles group on the FORMAT tab. C) Cells group on the HOME tab. D) Styles group on the HOME tab.
Computer Science & Information Technology
The ________ data type inserts a unique, numeric value when a new record is entered
A) Currency B) Number C) AutoNumber D) Calculated
Computer Science & Information Technology
Which of the following do NOT make VBA code easy to read?
A) Paragraphs B) Comments C) Line breaks D) Indentations
Computer Science & Information Technology
What statement regarding NTFS features is NOT accurate?
A. NTFS supports the use of file compression. B. NTFS is a journaling file system. C. NTFS does not maintain an index of files. D. NTFS supports the POSIX standard.
Computer Science & Information Technology