DDoS attacks are a manifestation of which component of the DAD triad model of malicious activity?
a. Disclosure
b. Denial
c. Alteration
Ans: b. Denial
You might also like to view...
The ____ attempts to find solutions to a problem by constructing partial solutions and making sure that any partial solution does not violate the problem requirements.
A. backtracking algorithm B. inferring algorithm C. interpretation algorithm D. stack tracing algorithm
A(n) ____________ system consists of hardware and application software designed to offer a complete information system solution.
Fill in the blank(s) with the appropriate word(s).
You can have several desktop apps on the desktop but only one open at a time.
Answer the following statement true (T) or false (F)
A keystroke logger allows hackers to take control of your computer
Indicate whether the statement is true or false