In a ____ attack, the attacker sends a large number of connection or information requests to a target in an attempt to overwhelm its capacity and make it unavailable for legitimate users.

A. man-in-the-middle
B. sniffer
C. dictionary
D. denial-of-service (DoS)

Answer: D

Computer Science & Information Technology

You might also like to view...

Use the ____ settings on the Layers panel to create different effects when blending layers.

a. Translucent b. Opacity c. Visibility d. Special

Computer Science & Information Technology

When you ____, the action playback runs through the steps seamlessly, without any visible dialog boxes.

a. toggle interactive b. toggle modal controls off c. select ignore sequence d. select run

Computer Science & Information Technology