A sophisticated denial of service attack that is spread out to many attacking computer systems is called a ____.

A. DDOS
B. DOS
C. DDOD
D. DOD

Answer: A

Computer Science & Information Technology

You might also like to view...

When manually typing criteria such as a date in a function, you must enclose the criteria with ________

A) quotation marks (") B) asterisks (*) C) number signs (#) D) ampersands (@)

Computer Science & Information Technology

A frequently overlooked component of an information system, ____________________ are the written instructions for accomplishing a specific task.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology