DDoS attacks are a manifestation of which component of the DAD triad model of malicious activity?

a. Disclosure
b. Denial
c. Alteration

Ans: b. Denial

Computer Science & Information Technology

You might also like to view...

One style property supported by the page box is the ____ property, which allows Web authors to define the default dimensions of a printed page as well as whether pages should be printed in portrait or landscape orientation.

A. size B. text C. orientation D. margin

Computer Science & Information Technology

A cable is running along the floor between two work areas where people walk.   Which of the following steps should be taken first?

A. Implement cable management. B. Cut the cable and remove it. C. Try to run the cable overhead. D. Call the building maintenance department.

Computer Science & Information Technology