____ attacks involve overloading a server with an overwhelming amount of network traffic so that it can't handle legitimate requests for network services.
A. Brute-force
B. Session hijacking
C. Address spoofing
D. Denial-of-service (DoS)
Answer: D
Computer Science & Information Technology
You might also like to view...
The characteristic that defines the kind of data you can store in a field is the:
a. data source b. data type c. field property
Computer Science & Information Technology
Filters delete tasks that do not meet the filter criteria.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
You must download a template each time you want to use it. In other words, you cannot save it for future use.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
While it's common to change font color for links using pseudo-classes, you can change other element styles as well, including background.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology