____ attacks involve overloading a server with an overwhelming amount of network traffic so that it can't handle legitimate requests for network services.

A. Brute-force
B. Session hijacking
C. Address spoofing
D. Denial-of-service (DoS)

Answer: D

Computer Science & Information Technology

You might also like to view...

Which data validation method forces users to conform to a specific data-entry format for a given field?

A) Input mask B) Validation text C) Default value D) Data macro

Computer Science & Information Technology

Which process is being described by the following steps? 1. A user logs into domain A using a PKI certificate on a smartcard protected by an 8-digit PIN. 2. The credential is cached by the authenticating server in domain

A. 3. Later, the user attempts to access a resource in domain B. 4. A request to the original authenticating server is initiated to somehow attest to the resource server in the second domain that the user is in fact who they claim to be. A. HTML B. SAML C. SOAP D. IPsec

Computer Science & Information Technology