In a ____ attack, the attacker sends a large number of connection or information requests to a target in an attempt to overwhelm its capacity and make it unavailable for legitimate users.
A. man-in-the-middle
B. sniffer
C. dictionary
D. denial-of-service (DoS)
Answer: D
Computer Science & Information Technology
You might also like to view...
Use the ____ settings on the Layers panel to create different effects when blending layers.
a. Translucent b. Opacity c. Visibility d. Special
Computer Science & Information Technology
When you ____, the action playback runs through the steps seamlessly, without any visible dialog boxes.
a. toggle interactive b. toggle modal controls off c. select ignore sequence d. select run
Computer Science & Information Technology