The _________ prevents or inhibits the normal use or management of communications facilities.

A. passive attack B. traffic encryption

C. denial of service D. masquerade

C. denial of service

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a combination of different formats that can be applied to shapes or other objects

Fill in the blank(s) with correct word

Computer Science & Information Technology

Data from an Access query cannot be exported into a file that can be opened by Excel

Indicate whether the statement is true or false

Computer Science & Information Technology