A __________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.
Fill in the blank(s) with the appropriate word(s).
denial-of-service
Computer Science & Information Technology
You might also like to view...
________ software helps you manage e-mail, contacts, calendars, and tasks in the same application
A) Spreadsheet B) Note-taking C) Presentation D) Personal information manager
Computer Science & Information Technology
Justify is an example of text alignment
Indicate whether the statement is true or false
Computer Science & Information Technology