Multiple Choice
A attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.
A) spam
B) rootkit
C) logic bomb
D) distributed denial-of-service
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q16: The cost of creating an email campaign
Q26: Discussing security attacks through public trials and
Q28: The USA Patriot Act defines cyberterrorism as
Q29: The security of any system or network
Q30: A software and/or hardware that monitors system
Q31: is the abuse of email systems to
Q32: To initiate a denialofservice attack, a tiny
Q34: A strong security program begins by .<br>A)
Q35: Often a successful attack on an information
Q40: A security policy outlines exactly what needs