A ________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

A. DDoS
B. phishing
C. scareware
D. pretexting


Answer: A

Computer Science & Information Technology

You might also like to view...

What are some of the automated deployment options available in Windows 10?

What will be an ideal response?

Computer Science & Information Technology

A group of slots is called a ________

A) socket B) bank C) set D) cluster

Computer Science & Information Technology

A Flash movie’s stage can be modified by using the

(a) Movie Properties dialog box. (b) Stage Properties dialog box. (c) Options menu. (d) Paint Bucket tool.

Computer Science & Information Technology

Which of the following is used to manage access to shared resources in most operating systems?

A. user accounts B. computer accounts C. permission accounts D. administrator accounts

Computer Science & Information Technology