DDoS attacks are a manifestation of which component of the DAD triad model of malicious activity?
a. Disclosure
b. Denial
c. Alteration
Ans: b. Denial
Computer Science & Information Technology
You might also like to view...
One style property supported by the page box is the ____ property, which allows Web authors to define the default dimensions of a printed page as well as whether pages should be printed in portrait or landscape orientation.
A. size B. text C. orientation D. margin
Computer Science & Information Technology
A cable is running along the floor between two work areas where people walk. Which of the following steps should be taken first?
A. Implement cable management. B. Cut the cable and remove it. C. Try to run the cable overhead. D. Call the building maintenance department.
Computer Science & Information Technology