Botnets can flood a Web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. What is this called?

A. manipulating online polls
B. spamming
C. spreading malware
D. denying services


Answer: D

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) XDocument and XElement inherit from XContainer, a class that represents nodes in the DOM that can contain other nodes. 2) XML namespaces help avoid naming collisions between XML documents. 3) The XDocument contstructor sets the given XElement as the root element in the new XML document. 4) There is an XSLT processor included in Internet Explorer to help perform transformations. 5) XslCompiledTransform’s Load method parses and loads a style sheet.

Computer Science & Information Technology

This command prompt command does the same as the interface underlying the Disk Management tool.

A. Disk B. PartDisk C. formatNTFS D. diskpart

Computer Science & Information Technology

Which item in the figure above points to the Freeze Mask tool?

A. 5 B. 6 C. 7 D. 8

Computer Science & Information Technology

The Class class has a(n) ____ method that, given a string whose value is the name of a class, returns a Class with that name.

A. forName() B. getName() C. forClass() D. getClass()

Computer Science & Information Technology