An attack that attempts to deny corporate computing resources to legitimate users is a ______________.

A. virus
B. denial of service
C. worm
D. Trojan
E. replay attack

Answer: B

Computer Science & Information Technology

You might also like to view...

What will be displayed when the following code is executed?

int number = 6; while (number > 0) { number -= 3; System.out.print(number + " "); } a. 6 3 0 b. 6 3 c. 3 0 d. 3 0 -3 e. 0 -3

Computer Science & Information Technology

Which of the following statements is false?

a. Most classes you’ll use in Java programs must be imported explicitly. b. There’s a special relationship between classes that are compiled in the same directory. By default, such classes are considered to be in the same package—known as the default package. c. Classes in the same package are implicitly imported into main. d. An import declaration is not required when one class in a package uses another in the same package.

Computer Science & Information Technology