DDoS attacks are a manifestation of which component of the DAD triad model of malicious activity?

a. Disclosure
b. Denial
c. Alteration


Ans: b. Denial

Computer Science & Information Technology

You might also like to view...

The ____ attempts to find solutions to a problem by constructing partial solutions and making sure that any partial solution does not violate the problem requirements.

A. backtracking algorithm B. inferring algorithm C. interpretation algorithm D. stack tracing algorithm

Computer Science & Information Technology

A(n) ____________ system consists of hardware and application software designed to offer a complete information system solution.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can have several desktop apps on the desktop but only one open at a time.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A keystroke logger allows hackers to take control of your computer

Indicate whether the statement is true or false

Computer Science & Information Technology