Multiple Choice
In 2000, hackers broke into hundreds of servers and planted Trojan horse .exe programs, which were then used to launch a barrage of service requests in a concerted attack at e-commerce websites, such as Yahoo! and eBay. This is an example of a distributed ________________ attack.
A) acceptance of service
B) denial of service
C) zombie
D) Trojan virus
Correct Answer:

Verified
Correct Answer:
Verified
Q8: Most companies don't reveal that they have
Q9: Lawsuits by monitored workers against employers are:<br>A)
Q10: One of the major principles of technology
Q11: Many companies and organizations have established guidelines
Q12: Sending extremely critical, derogatory, and often vulgar
Q14: Information technologies have caused a significant reduction
Q15: Laws intended to regulate activities over the
Q16: The text describes a/an _ as a
Q17: According to the text, which are the
Q18: Computer monitoring has been criticized as unethical