An attack on a server that originates from many sources is known as a:
a. DDoS
b. DoS
c. Botnet
d. Teardrop
a. DDoS
Computer Science & Information Technology
You might also like to view...
The RJ-48 connector uses what type of cabling?
A) Wireless B) Twisted pair C) SMF D) MMF
Computer Science & Information Technology
When using trap-and-trace, the trace usually consists of a honeypot or padded cell and an alarm. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology