An intentional action designed to prevent legitimate users from making use of a computer service is called

a. a bombing run.
b. a curtain closer.
c. a denial-of-service attack.
d. an electronic overdose.
e. phreaking.

C

Computer Science & Information Technology

You might also like to view...

A ________ is a category or column of information in a data source

A) title B) header C) record D) footer

Computer Science & Information Technology

The _______ command is used to change a FAT partition to NTFS and preserve the data stored on the FAT partition

Fill in the blank(s) with correct word

Computer Science & Information Technology