Which individual is considered to be a script kiddie who uses automated tools to inundate a Web site with a barrage of network traffic, usually resulting in a denial of service?

A. Cyberterrorist
B. Packet monkey
C. Phreaker
D. Hacktivist


Answer: B

Computer Science & Information Technology

You might also like to view...

Using the Report Wizard, the report layout is automatically saved in the table file along with the queries and forms that you have already created.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Compute the cost of r  A=B s using the following methods:

1. Nested loops 2. Block-nested loops 3. Index-nested loops with a hash index on B in s (consider both clustered and unclustered index) where r occupies 2000 pages, 20 tuples per page; s occupies 5000 pages, 5 tuples per page; and the amount of main memory available for a block-nested loops join is 402 pages. Assume that at most 5 tuples of s match each tuple in r.

Computer Science & Information Technology

_______________ is the common name used for the various implementations of the IEEE 802.11 wireless Ethernet standard.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) _________________________ search query seeks information on a broader scale using a simple keyword such as rainforest rather thanĀ "average rainfall" Amazon rainforest?, which would be used in a targeted search for specific information.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology