A ________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
A. DDoS
B. phishing
C. scareware
D. pretexting
Answer: A
Computer Science & Information Technology
You might also like to view...
What are some of the automated deployment options available in Windows 10?
What will be an ideal response?
Computer Science & Information Technology
A group of slots is called a ________
A) socket B) bank C) set D) cluster
Computer Science & Information Technology
A Flash movie’s stage can be modified by using the
(a) Movie Properties dialog box. (b) Stage Properties dialog box. (c) Options menu. (d) Paint Bucket tool.
Computer Science & Information Technology
Which of the following is used to manage access to shared resources in most operating systems?
A. user accounts B. computer accounts C. permission accounts D. administrator accounts
Computer Science & Information Technology