The countermeasure that protects individuals from becoming victims of ____ attacks is to use unique user names and passwords at each website that requires a login.

A. ?DDoS
B. ?brute force
C. ?phishing
D. ?none of the above


Answer: B

Computer Science & Information Technology

You might also like to view...

The Back Up Database command is located on ________ view

A) Report B) Backstage C) Datasheet D) Form

Computer Science & Information Technology

A(n) ________ list can be applied to bullet points in place of bullet symbols

Fill in the blank(s) with correct word

Computer Science & Information Technology

The common term for each of the SNMP system core functions is ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Blogging and wiki applications, along with many Web applications, are designed by using what is known as a three-tiered architecture, in which each tier, or functional component, is responsible for one of these specific processing tasks. Discuss the three tiers.

What will be an ideal response?

Computer Science & Information Technology