____ attacks involve overloading a server with an overwhelming amount of network traffic so that it can't handle legitimate requests for network services.

A. Brute-force
B. Session hijacking
C. Address spoofing
D. Denial-of-service (DoS)


Answer: D

Computer Science & Information Technology

You might also like to view...

The characteristic that defines the kind of data you can store in a field is the:

a. data source b. data type c. field property

Computer Science & Information Technology

Filters delete tasks that do not meet the filter criteria.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You must download a template each time you want to use it. In other words, you cannot save it for future use.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

While it's common to change font color for links using pseudo-classes, you can change other element styles as well, including background.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology