Multiple Choice
In the context of security threats,a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
A) magnetic disk
B) denial-of-service attack
C) backdoor
D) mirror disk
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q79: In the context of security,social engineering protects
Q80: _ are independent programs that can spread
Q82: Explain the concept of mirror disks.
Q83: Data sent through a virtual private network
Q85: What is the function of a virtual
Q86: Identify a true statement about firewalls.<br>A)Firewalls protect
Q87: _ monitor and record the keys pressed
Q88: In the context of the CIA triangle,part
Q89: A level 1 security system is used
Q105: _is an attempt to gain access to