menu-iconExamlexExamLexServices

Discover

Ask a Question
  1. All Topics
  2. Topic
    Geology/Geography/Oceanography/Atmospheric Sciences
  3. Study Set
    Principles of Incident Response
  4. Exam
    Exam 1: Contingency Planning Within Information Security
  5. Question
    A ____ Attack Seeks to Deny Legitimate Users Access to Services
Solved

A ____ Attack Seeks to Deny Legitimate Users Access to Services

Question 25

Question 25

Multiple Choice

A ____ attack seeks to deny legitimate users access to services by either tying up a server's available resources or causing it to shut down.


A) Trojan horse
B) DoS
C) social engineering
D) spyware

Correct Answer:

verifed

Verified

Unlock this answer now
Get Access to more Verified Answers free of charge

Related Questions

Q20: _ is the process of identifying vulnerabilities

Q21: _ assigns a risk rating or score

Q22: Once intellectual property (IP)has been defined and

Q23: What is the difference between a disaster

Q24: Information has the characteristic of _ when

Q26: <i>Match each statement with an item below.</i><br>-Something

Q27: <i>Match each statement with an item below.</i><br>-Includes

Q28: A(n)_ is any clearly identified attack on

Q29: <i>Match each statement with an item below.</i><br>-A

Q30: Once the project team for information security

Examlex

ExamLex

About UsContact UsPerks CenterHomeschoolingTest Prep

Work With Us

Campus RepresentativeInfluencers

Links

FaqPricingChrome Extension

Download The App

Get App StoreGet Google Play

Policies

Privacy PolicyTerms of ServiceHonor CodeCommunity Guidelines

Scan To Download

qr-code

Copyright © (2025) ExamLex LLC.

Privacy PolicyTerms Of ServiceHonor CodeCommunity Guidelines