____ attacks involve overloading a server with an overwhelming amount of network traffic so that it can't handle legitimate requests for network services.
A. Brute-force
B. Session hijacking
C. Address spoofing
D. Denial-of-service (DoS)
Answer: D
You might also like to view...
Which data validation method forces users to conform to a specific data-entry format for a given field?
A) Input mask B) Validation text C) Default value D) Data macro
Which process is being described by the following steps? 1. A user logs into domain A using a PKI certificate on a smartcard protected by an 8-digit PIN. 2. The credential is cached by the authenticating server in domain
A. 3. Later, the user attempts to access a resource in domain B. 4. A request to the original authenticating server is initiated to somehow attest to the resource server in the second domain that the user is in fact who they claim to be. A. HTML B. SAML C. SOAP D. IPsec