______ involve programming a computer to continuously send fake authentication messages to a targeted server, keeping it constantly busy and forcing out legitimate users.
a. Password phishing
b. Web spoofing
c. Denial of service attacks
d. Sniffers
c. Denial of service attacks
You might also like to view...
An intensive supervision probation program is ________ than traditional probation
A) more successful B) less costly C) more rigorous D) less humane
The jury trial did not prove to be very well suited to criminal proceedings in civil law systems. Which of the following came to provide a functional equivalent to the jury trial?
a. Trial by compurgation b. Mixed benches c. Petite, rather than Grand, juries d. Trial by ordeal
How many federal laws govern electronic surveillance?
a. Two b. ?Three c. ?Four d. ?Five
Which of the following statements about a detention hearing is true?
a. A detention hearing involves the fact-finding process wherein the juvenile court determines whether there is sufficient evidence to sustain the allegations in a petition b. A detention hearing is the equivalent of sentencing for adult offenders c. A detention hearing is normally held to determine whether to remand the child to a shelter d. A detention hearing finds the child delinquent guilty and the court must decide what should be done to treat the child