Identify the attack in which a malicious hacker floods a target site with demands for data and other small tasks.

a. Distributed denial-of-service
b. Smishing
c. Logic bomb
d. Phishing


a. Distributed denial-of-service
In a distributed denial-of-service (DDoS) attack, a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks. A distributed denial-of-service attack does not involve infiltration of the targeted system. Instead, it keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.

Computer Science & Information Technology

You might also like to view...

Use a spreadsheet to create a checkerboard. Resize the rows and columns of a spreadsheet to make 8 rows and 8 columns of equal size. Color alternate squares red and black. Print it in color.

What will be an ideal response?

Computer Science & Information Technology

When inputting a nested IIF Function, you should add a new IIF Function to the falsepart argument

Indicate whether the statement is true or false

Computer Science & Information Technology

In a presentation, slide numbers can be inserted into ________

A) only the header B) the header or footer C) only the footer D) the top placeholder in a slide

Computer Science & Information Technology

Which statement is true regarding the use of the Logon Hours option under a user's account?

A. The Logon Hours forces a user to log off during "Logon denied" periods B. Logon Hours can't be changed during weekends C. The Logon Hours can't be used to disconnect a user that is already logged in D. Logon hours can be set for specific days of the month, as well as holidays

Computer Science & Information Technology