Hackers often use a botnet to launch a ____, or a bombardment of network traffic or messages designed to overload a server.?
A. ?TCP/IP attack
B. ?denial of service (DoS) attack
C. ?Theft by computer
D. ?Trojan horse attack
Answer: B
Computer Science & Information Technology
You might also like to view...
Aggregate functions are most commonly used in all of the following Access objects EXCEPT:
A) queries. B) reports. C) tables. D) macros.
Computer Science & Information Technology
Excel cannot create permanent connections between an Access database and an Excel spreadsheet
Indicate whether the statement is true or false
Computer Science & Information Technology