In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.

A. denial-of-service
B. distributed denial-of-service
C. virus
D. spam

Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following patterns extends the fill series to 575, 550, 525?

A. 650, 600 B. 625, 600 C. 560, 580 D. 500, 475

Computer Science & Information Technology

To add functionality to a control such as a Button or ListBox, you need to ____________ for it.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology