Your friend committed a _________ attack when he flooded an Internet site with emails and made the website "crash" because the company refused to pay him a bribe
a. denial-of-service
b. "one-off-kamikaze"
c. manipulation-of-service
d. phishing attack
a
You might also like to view...
The National Research Council conducted an in-depth study of threat-related vulnerabilities
within U.S. society in 2002. They found that the ________ and efficiency of key infrastructures make them particularly susceptible to terrorist attack. A) low security awareness level B) openness C) profitability D) location
Which of the following concepts best captures the utilitarian notion that each person's welfare is equally important and, thus, that no one person's happiness should be regarded as more important than any other person's?
a. Fecundity b. Psychological hedonism c. Agent neutrality d. Nobility of intent
When abuse and/or neglect is perpetrated by someone within an institution, the group most likely to perpetrate said maltreatment is ______.
A. doctors B. psychiatric staff C. administrative staff D. nursing aides
Handling juvenile offenders can produce major role conflicts for police
Indicate whether the statement is true or false