____ attacks exploit the existing software weaknesses. The effect is either degraded performance or crashes on the victim server.?

A. ?Software
B. ?Flood
C. ?Voluntary
D. ?Isolated

Answer: A

Computer Science & Information Technology

You might also like to view...

The process of moving tables into one database file, and forms, queries, and reports into a separate database file is called ________

A) splitting B) separating C) jamming D) moving

Computer Science & Information Technology

Incident ____ is the process of evaluating organizational events, determining which events are possible incidents, also called incident candidates, and then determining whether or not the incident candidate is an actual incident or a nonevent, also called a false positive incident candidate.

A. identification B. journal C. vulnerability D. classification

Computer Science & Information Technology