A __________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.

Fill in the blank(s) with the appropriate word(s).

denial-of-service

Computer Science & Information Technology

You might also like to view...

________ software helps you manage e-mail, contacts, calendars, and tasks in the same application

A) Spreadsheet B) Note-taking C) Presentation D) Personal information manager

Computer Science & Information Technology

Justify is an example of text alignment

Indicate whether the statement is true or false

Computer Science & Information Technology