Which type of attack attempts to overload the system with requests, denying legitimate users access?

a. Denial of service
b. ip spoofing
c. Phishing
d. None of the above

Answer A.

Computer Science & Information Technology

You might also like to view...

Which of the following is not true regarding Office Web Apps?

a. Office Web Apps enable you to create, access, share, and perform light editing on Microsoft Office documents from any device that connects to the Internet. b. You need to have Office 2010 installed on your computer to use Office Web Apps. c. Office Web Apps are available in two ways. d. Office Web Apps are the online companions to Microsoft Office Word, Excel, PowerPoint, and OneNote.

Computer Science & Information Technology

After a technician has identified the problem and its impact, which of the following steps should be performed NEXT?

A. Implement preventative measures. B. Establish a plan of action to resolve the problem. C. Establish a theory of probable cause. D. Implement the solution or escalate as necessary.

Computer Science & Information Technology