Multiple Choice
A ____ attack floods a network or server with service requests to prevent legitimate users' access to the system.
A) logic bomb
B) denial-of-service
C) backdoor
D) worm
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q16: _ are usually placed in front of
Q38: Explain the use of callback modems as
Q50: Part of ensuring integrity is identifying authorized
Q62: When a program containing a virus is
Q73: _ are independent programs that can spread
Q87: The cost of setting up a virtual
Q88: Describe the function of identification (ID)badges.
Q93: _ security measures use a physiological element
Q95: Many organizations now follow the _ model
Q98: A distributed denial-of-service (DDoS)attack involves hundreds of