A(n) ________ is an attack in which multiple systems are used to flood servers or network devices or links with traffic in an attempt to overwhelm its available resources, making it unavailable to respond to legitimate users.

A) DDoS
B) DoS
C) ODC
D) SAL

A) DDoS

Computer Science & Information Technology

You might also like to view...

Which of the following statements best describes a union query?

A) It adds the results of a query to an existing table. B) It combines the results of two or more similar select queries. C) It displays an input box that asks for criteria each time the query is run. D) It can add, delete, or modify records in a table.

Computer Science & Information Technology

Which Cisco IOS extended ACL port number keyword would be used to match a specific port number range?

A) limit B) list C) group D) range

Computer Science & Information Technology