Which of the following does a DoS attack target?

a. Confidentiality
b. Security
c. Integrity
d. Availability

ANS: D

Computer Science & Information Technology

You might also like to view...

Analyze the following code.

``` import javafx.application.Application; import javafx.event.ActionEvent; import javafx.event.EventHandler; import javafx.scene.Scene; import javafx.scene.control.Button; import javafx.stage.Stage; public class Test extends Application { @Override // Override the start method in the Application class public void start(Stage primaryStage) { Button btOK = new Button("OK"); btOK.setOnAction(new EventHandler() { public void handle(ActionEvent e) { System.out.println("The OK button is clicked"); } }); Scene scene = new Scene(btOK, 200, 250); primaryStage.setTitle("MyJavaFX"); // Set the stage title primaryStage.setScene(scene); // Place the scene in the stage primaryStage.show(); // Display the stage } /** * The main method is only needed for the IDE with limited JavaFX * support. Not needed for running from the command line. */ public static void main(String[] args) { launch(args); } }``` a. The program has a compile error because no handlers are registered with btOK. b. The program has a runtime error because no handlers are registered with btOK. c. The message "The OK button is clicked" is displayed when you click the OK button. d. The handle method is not executed when you click the OK button, because no handler is registered with btOK.

Computer Science & Information Technology

What allows an application to implement an encryption algorithm for execution?

A. counters B. crypto service providers C. initialization vectors D. crypto modules

Computer Science & Information Technology