In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.
A. denial-of-service
B. distributed denial-of-service
C. virus
D. spam
Answer: A
Computer Science & Information Technology
You might also like to view...
Which of the following patterns extends the fill series to 575, 550, 525?
A. 650, 600 B. 625, 600 C. 560, 580 D. 500, 475
Computer Science & Information Technology
To add functionality to a control such as a Button or ListBox, you need to ____________ for it.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology