The _________ prevents or inhibits the normal use or management of communications facilities.

A. passive attack B. traffic encryption

C. denial of service D. masquerade


C. denial of service

Computer Science & Information Technology

You might also like to view...

Which method determines if a JCheckBox is selected?

a. isSelected b. getSelected c. selected d. None of the above

Computer Science & Information Technology

If you purchase software in a box, it is likely distributed on which type of storage media?

A) DVD B) CD-ROM C) Blu-ray D) Floppy disk

Computer Science & Information Technology

Directories in the ____ directory are typically used as mount points.

A. /etc/mnt B. /mnt C. /etc/fstab D. /data/mount

Computer Science & Information Technology

Web browsers will recognize multiple line breaks typed in the body of an HTML document, and will insert spaces for each one.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology