Multiple Choice
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ________ attack.
A) DDoS
B) DoS
C) SQL injection
D) phishing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: The Gramm-Leach-Bliley Act<br>A) requires financial institutions to
Q11: For 100% availability, online transaction processing requires<br>A)
Q16: What is a digital certificate? How does
Q33: Which of the following is not an
Q64: An authentication token is a(n):<br>A)device the size
Q66: A practice in which eavesdroppers drive by
Q69: Sniffers enable hackers to steal proprietary information
Q77: Downtime refers to periods of time in
Q87: Currently, the protocols used for secure information
Q88: A keylogger is a type of<br>A) worm.<br>B)