Which of the following is an example of a denial-of-service attack?
A. Clicking a link in an e-mail that happens to contain malware
B. Installing a keylogger on a system in an attempt to collect usernames and passwords
C. Flooding a system with ping requests in an attempt to take it down
D. View medical records to satisfy one's curiosity
Answer: C
Explanation: Flooding a system with ping requests is an example of a denial-of-service attack. Installing a keylogger to collect usernames and passwords is an example of an unauthorized access or use. Viewing medical records for curiosity is an example of inappropriate use.
You might also like to view...
The I Love You virus caused harm because ________
a. It had a negative payload. b. It erased data on computers. c. It generated large numbers of emails that bogged down many networks. d. None of the above.
Given the rankings you had obtained in Exercise 12, compute the correla- tion between the rankings of confidence and the other five measures. Which measure is most highly correlated with confidence? Which measure is least correlated with confidence?
What will be an ideal response?