An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ___________ attack

a. stealth
b. backdoor
c. scareware
d. denial-of-service


D

Computer Science & Information Technology

You might also like to view...

You would use the Performance Analyzer tool to help reduce data redundancies

Indicate whether the statement is true or false

Computer Science & Information Technology

In the figure above, which number refers to the midtones slider?

A. 1 B. 2 C. 3 D. 4

Computer Science & Information Technology

Which of the following statements is false?

a) By default, the Toolbox contains only the Rectangle and Ellipse shapes, which you can drag onto the GUI designer. b) To edit a shape’s properties in the Properties window you must first select the shape in the designer. c) A Canvas allows you to specify the exact position of a shape. d) The Document Outline window shows the nested structure of a page’s layouts and controls and makes it easier to select specific controls to customize them with the Properties window.

Computer Science & Information Technology

____________________  can support the message you want your presentation to communicate.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology