An attack that attempts to deny corporate computing resources to legitimate users is a ______________.
A. virus
B. denial of service
C. worm
D. Trojan
E. replay attack
Answer: B
You might also like to view...
When you crop an image, how many cropping handles are there?
A) 2 B) 6 C) 4 D) 8
Folders automatically shared with the network in Windows 8.1 are __________
a. Only the Public folder and default administrative shares b. Only the hidden share C$ c. Only default administrative shares d. Only the Public folder
What is the name for the type of flash memory that is used by mobile devices to store their apps and data?
A. SC card B. solid state device C. MicroFlash card D. hard drive
__________ firewalls are designed to operate at the media access control sublayer of the data link layer of the OSI network model.
A. MAC layer B. Circuit gateway C. Application gateway D. Packet-filtering