Multiple Choice
What is a denial of service attack?
A) It is an attack when the perpetrator is inserting malicious query in input such that it is passed to and executed by an application program.
B) It is an attack when the perpetrator is inputting so much data that the input buffer overflows.The overflow contains code that takes control of the company's computer.
C) It is an attack when the perpetrator uses software to guess company's addresses,send employees blank e-mails,and add unreturned messages to spammer e-mail list.
D) It is an attacked when the perpetrator sends hundreds of messages from randomly generated false addresses,overloading an Internet service provider's e-mail server.
Correct Answer:

Verified
Correct Answer:
Verified
Q57: Law enforcement uses key logging software,a form
Q58: A hacker who changed the voice mail
Q59: How can a system be protected from
Q60: Describe at least four social engineering techniques.Provide
Q61: Which of the following would be least
Q63: Which of the following is the easiest
Q64: Which of the following is not a
Q65: A _ is similar to a _,except
Q66: Illegally obtaining and using confidential information about
Q67: Taking control of a phone to make