________ floods a computer with requests until it shuts down denying access to legitimate users

A) An encryption virus
B) A DoS attack
C) A polymorphic virus
D) Port blocking

B

Computer Science & Information Technology

You might also like to view...

Once you have created a Random object, you can call its ____________ method to get a random integer number.

a. Next b. Get Integer c. Generate Number d. Next Integer

Computer Science & Information Technology

Writing code so that an operator can be used with variables of programmer defined types is called __________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology