A(n)____ attack involves sending a continuous stream of server requests that ultimately overloads a server's capacity to respond.
A. DDoS
B. MDoS
C. SSoS
D. PPoS
Answer: A
Computer Science & Information Technology
You might also like to view...
When importing a text file into an existing Access table, the field names in the first row of the text file must match the field names in the table
Indicate whether the statement is true or false
Computer Science & Information Technology
____ are the horizontal and vertical lines that are created and positioned in the Document window.
A. Guides B. Rulers C. Measures D. Spacers
Computer Science & Information Technology