Multiple Choice
An attempt to make a computer resource unavailable to its intended users is called ______
A) denial-of-service attack
B) virus attack
C) worms attack
D) botnet process
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q12: USENET falls under which category of public
Q13: Pretty good privacy (PGP) is used in
Q14: Internet Key Exchange has _ phases and
Q15: TSL (Transport Layer Security) is a cryptographic
Q16: Diffie-Hellman algorithm is widely known as_<br>A)key exchange
Q17: RSA is also a stream cipher like
Q19: ECC stands for<br>A)elliptic curve cryptography<br>B)elliptic cryptography curve<br>C)error
Q20: In tunnel mode, IPSec protects the _<br>A)entire
Q21: WPA2 is used for security in _<br>A)ethernet<br>B)wi-fi<br>C)bluetooth<br>D)e-mail
Q22: For RSA to work, the value of