A(n) ________ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packets
A) virus
B) directly-propagating worm
C) DoS
D) bot
Answer: C
Business
You might also like to view...
The operating cash flow cycle compares the combined age of inventory and receivables with the age of payables in order to identify a funding gap
Indicate whether the statement is true or false
Business
Which of the following is true of a data model?
A) It is created after the database is designed. B) It is an attribute whose value is associated with only one entity instance. C) It is a logical representation of the structure of the data. D) It does not describe the relationships among the data.
Business