Multiple Choice
An attempt to make a computer resource unavailable to its intended users is called ____________________________
A) denial-of-service attack
B) virus attack
C) worms attack
D) botnet process
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: In RSA, ?(n) = in terms of
Q3: The is a polygraphic substitution cipher based
Q4: RSA is also a stream cipher like
Q5: In cryptography the original message before being
Q6: _is the practice of concealing a message
Q7: SSL primarily focuses on _ Pretty good
Q8: ECC stands for<br>A)elliptic curve cryptography<br>B)elliptic cryptography curve<br>C)error
Q9: Diffie-Hellman algorithm is widely known as_<br>A)key exchange
Q10: In Asymmetric-Key Cryptography, the two keys, e
Q11: In asymmetric key cryptography, the private key