An attack on a server that originates from many sources is known as a:

a. DDoS
b. DoS
c. Botnet
d. Teardrop

a. DDoS

Computer Science & Information Technology

You might also like to view...

The RJ-48 connector uses what type of cabling?

A) Wireless B) Twisted pair C) SMF D) MMF

Computer Science & Information Technology

When using trap-and-trace, the trace usually consists of a honeypot or padded cell and an alarm. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology