When an attack is designed to prevent authorized users from accessing a system, it is called what kind of attack?

A. MITM
B. spoofing
C. denial of service
D. blocking

Answer: C

Computer Science & Information Technology

You might also like to view...

If a product is tested 100 times and the rate at which it fails is recorded on a scale of 1 to 10, then the average of all the product's failure rates on the scale could be useful. This is an example of ________ data

A) nominal B) ordinal C) interval D) ratio

Computer Science & Information Technology

Like selection list items, only one radio button can be selected at a time.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology