Case 5-1
Luke is frustrated as he is often criticized by his employer for not meeting deadlines. He decides to take revenge on his employer for criticizing him in front of all his peers.
Luke asks his friends in the organization to flood the network server by sending it unsolicited requests. He does this to avoid being suspected by his employer. This act of sabotage is called _____.
A. ?war driving
B. ?data piggybacking
C. ?a distributed denial of service attack
D. ?a brick encryption attack
Answer: C
Computer Science & Information Technology
You might also like to view...
Explain the step by step process you set up to prepare the data from the Excel shipment file to add it to the inventory table in Access
What will be an ideal response?
Computer Science & Information Technology
Types in Java are divided into two categories. The primitive types are boolean, byte, char, short, int, long, float and double. All other types are ________ types.
a. static b. reference c. declared d. source
Computer Science & Information Technology