Multiple Choice
Which of these would be an example of a DDoS attack?
A) An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases
B) Overloading a popular social networking site with inbound messages in order to shut down access to the site
C) Launching a targeted phishing campaign on a department of defense or other surveilance network.
D) Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services.
E) Launching tough-to-track click-fraud efforts
Correct Answer:

Verified
Correct Answer:
Verified
Q2: Organized crime networks now have their own
Q3: The use of public wireless connections can
Q4: Technologies that measure and analyze human body
Q5: The information systems of several firms have
Q6: Which of the following are considered sources
Q8: A protester seeking to make a political
Q9: The term _ originally referred to a
Q10: Describe briefly a few of the physical
Q11: According to research firm Gartner, the majority
Q12: Attacks that exhaust all possible password combinations