An attack that attempts to deny corporate computing resources to legitimate users is a ______________.

A. virus
B. denial of service
C. worm
D. Trojan
E. replay attack


Answer: B

Computer Science & Information Technology

You might also like to view...

When you crop an image, how many cropping handles are there?

A) 2 B) 6 C) 4 D) 8

Computer Science & Information Technology

Folders automatically shared with the network in Windows 8.1 are __________

a. Only the Public folder and default administrative shares b. Only the hidden share C$ c. Only default administrative shares d. Only the Public folder

Computer Science & Information Technology

What is the name for the type of flash memory that is used by mobile devices to store their apps and data?

A. SC card B. solid state device C. MicroFlash card D. hard drive

Computer Science & Information Technology

__________ firewalls are designed to operate at the media access control sublayer of the data link layer of the OSI network model.

A. MAC layer B. Circuit gateway C. Application gateway D. Packet-filtering

Computer Science & Information Technology