An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ___________ attack
a. stealth
b. backdoor
c. scareware
d. denial-of-service
D
Computer Science & Information Technology
You might also like to view...
Arrays static method ________ fills an array with values produced by a generator function that receives an int and returns a value of type int, long or double.
a. parallelFill b. parallelFillAll c. generateAll d. parallelSetAll
Computer Science & Information Technology
Vector graphics are often created on a computer, not through scanning or downloading.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology