The _________ prevents or inhibits the normal use or management of communications facilities.
A. passive attack B. traffic encryption
C. denial of service D. masquerade
C. denial of service
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a combination of different formats that can be applied to shapes or other objects
Fill in the blank(s) with correct word
Computer Science & Information Technology
Data from an Access query cannot be exported into a file that can be opened by Excel
Indicate whether the statement is true or false
Computer Science & Information Technology