A(n) ________ is an attack in which multiple systems are used to flood servers or network devices or links with traffic in an attempt to overwhelm its available resources, making it unavailable to respond to legitimate users.

A) DDoS
B) DoS
C) ODC
D) SAL


A) DDoS

Computer Science & Information Technology

You might also like to view...

When the reference count reaches zero, the ________ is deleted and the memory is released.

a. internal pointer b. external pointer c. internal reference d. external reference

Computer Science & Information Technology

What does the PHP construct exit return?

What does the PHP construct exit return? a. 0 b. true c. nothing d. 1

Computer Science & Information Technology

When protection is turned ON, others are prevented from making changes to locked cells in the worksheet

Indicate whether the statement is true or false

Computer Science & Information Technology

The type of software testing in which the tester does not look at the contents of the program is called ____ testing.

A. external B. white box C. internal D. black box

Computer Science & Information Technology