An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ___________ attack

a. stealth
b. backdoor
c. scareware
d. denial-of-service

D

Computer Science & Information Technology

You might also like to view...

Arrays static method ________ fills an array with values produced by a generator function that receives an int and returns a value of type int, long or double.

a. parallelFill b. parallelFillAll c. generateAll d. parallelSetAll

Computer Science & Information Technology

Vector graphics are often created on a computer, not through scanning or downloading.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology