Which of the following attacks attempts to prevent legitimate users from accessing resources?

A. IP spoofing attack
B. Denial-of-service attack
C. Rogue code attack
D. Social engineering attack

Answer: B
Explanation: A denial-of-service attack targets the resource availability by using up all the available bandwidth in an attempt to prevent authorized users from accessing resources.

Computer Science & Information Technology

You might also like to view...

An area in which mobile phones cannot connect to a cell tower is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

What are Web services. Give some examples of Web services.

What will be an ideal response?

Computer Science & Information Technology