A sophisticated denial of service attack that is spread out to many attacking computer systems is called a ____.
A. DDOS
B. DOS
C. DDOD
D. DOD
Answer: A
Computer Science & Information Technology
You might also like to view...
When manually typing criteria such as a date in a function, you must enclose the criteria with ________
A) quotation marks (") B) asterisks (*) C) number signs (#) D) ampersands (@)
Computer Science & Information Technology
A frequently overlooked component of an information system, ____________________ are the written instructions for accomplishing a specific task.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology