A(n)____ attack involves sending a continuous stream of server requests that ultimately overloads a server's capacity to respond.

A. DDoS
B. MDoS
C. SSoS
D. PPoS

Answer: A

Computer Science & Information Technology

You might also like to view...

When importing a text file into an existing Access table, the field names in the first row of the text file must match the field names in the table

Indicate whether the statement is true or false

Computer Science & Information Technology

____ are the horizontal and vertical lines that are created and positioned in the Document window.

A. Guides B. Rulers C. Measures D. Spacers

Computer Science & Information Technology