A(n) ____ attack occurs when an attacker disrupts normal computer processing or denies processing entirely.

A. ?necessity
B. ?integrity
C. ?secrecy
D. ?man-in-the-middle

Answer: A

Computer Science & Information Technology

You might also like to view...

Sources listed in the ________ of the Source Manager dialog box are available only for the document in use

Fill in the blank(s) with correct word

Computer Science & Information Technology

To select all cells that contain a formula, press Ctrl + ________

Fill in the blank(s) with correct word

Computer Science & Information Technology