A ________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

A. DDoS
B. phishing
C. scareware
D. pretexting

Answer: A

Computer Science & Information Technology

You might also like to view...

In an article with the source "International Business Machines," to cite the author you would

A) in the Author box, simply state "No Author Given". B) select the Corporate Author check box and use "International Business Machines". C) enter "Machines, International Business" as the author. D) select the Corporate Author check box and use "Machines, International Business".

Computer Science & Information Technology

The ____ is essentially the interface device between the wireless user device and the wired local area network.?

A. ?wireless server B. ?wireless workstation C. ?NIC D. ?access point

Computer Science & Information Technology