Multiple Choice
A malicious hacker flooded an online retailer's server with millions of bogus transactions.Due to this,the Web site's server was overloaded and the site was unable to process legitimate customer orders.Which of the following is being illustrated in this scenario?
A) spoofing
B) sniffing
C) phishing
D) denial-of-service
Correct Answer:

Verified
Correct Answer:
Verified
Q13: Agile development methodologies support just-in-time design.
Q14: Which of the following is the first
Q15: Business analysts work primarily with systems development,but
Q16: Secure Socket Layer uses a combination of
Q17: Tasks in the implementation activity of the
Q19: How should organizations respond to security incidents?<br>A)
Q20: Key escrow refers to the practice of
Q21: An incident response plan includes how employees
Q42: Poorly written application programs and procedures are
Q55: In the case of _,the same key