Which of the following attacks attempts to prevent legitimate users from accessing resources?
A. IP spoofing attack
B. Denial-of-service attack
C. Rogue code attack
D. Social engineering attack
Answer: B
Explanation: A denial-of-service attack targets the resource availability by using up all the available bandwidth in an attempt to prevent authorized users from accessing resources.
Computer Science & Information Technology
You might also like to view...
An area in which mobile phones cannot connect to a cell tower is called a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
What are Web services. Give some examples of Web services.
What will be an ideal response?
Computer Science & Information Technology