Multiple Choice
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
A) DDoS
B) DoS
C) SQL injection
D) phishing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q35: Malicious software programs referred to as _
Q36: Discuss the issue of security challenges on
Q37: The Sarbanes-Oxley Act<br>A) requires financial institutions to
Q38: _ controls ensure that valuable business data
Q39: Unauthorized access is a security challenge that
Q41: Public key encryption uses two keys.
Q42: Biometric authentication is the use of physical
Q43: _ refers to policies, procedures, and technical
Q44: Which of the following is not one
Q45: High-availability computing is also referred to as