Hackers often use a botnet to launch a ____, or a bombardment of network traffic or messages designed to overload a server.?

A. ?TCP/IP attack
B. ?denial of service (DoS) attack
C. ?Theft by computer
D. ?Trojan horse attack

Answer: B

Computer Science & Information Technology

You might also like to view...

Aggregate functions are most commonly used in all of the following Access objects EXCEPT:

A) queries. B) reports. C) tables. D) macros.

Computer Science & Information Technology

Excel cannot create permanent connections between an Access database and an Excel spreadsheet

Indicate whether the statement is true or false

Computer Science & Information Technology