A(n) ________ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packets

A) virus
B) directly-propagating worm
C) DoS
D) bot

Answer: C

Business

You might also like to view...

The operating cash flow cycle compares the combined age of inventory and receivables with the age of payables in order to identify a funding gap

Indicate whether the statement is true or false

Business

Which of the following is true of a data model?

A) It is created after the database is designed. B) It is an attribute whose value is associated with only one entity instance. C) It is a logical representation of the structure of the data. D) It does not describe the relationships among the data.

Business