A ________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
A. DDoS
B. phishing
C. scareware
D. pretexting
Answer: A
Computer Science & Information Technology
You might also like to view...
In an article with the source "International Business Machines," to cite the author you would
A) in the Author box, simply state "No Author Given". B) select the Corporate Author check box and use "International Business Machines". C) enter "Machines, International Business" as the author. D) select the Corporate Author check box and use "Machines, International Business".
Computer Science & Information Technology
The ____ is essentially the interface device between the wireless user device and the wired local area network.?
A. ?wireless server B. ?wireless workstation C. ?NIC D. ?access point
Computer Science & Information Technology