A(n) ____ attack occurs when an attacker disrupts normal computer processing or denies processing entirely.
A. ?necessity
B. ?integrity
C. ?secrecy
D. ?man-in-the-middle
Answer: A
Computer Science & Information Technology
You might also like to view...
Sources listed in the ________ of the Source Manager dialog box are available only for the document in use
Fill in the blank(s) with correct word
Computer Science & Information Technology
To select all cells that contain a formula, press Ctrl + ________
Fill in the blank(s) with correct word
Computer Science & Information Technology