An attack in which the user receives unwanted amount of e- mails.
A) smurfing
B) denial of service
C) e-mail bombing
D) ping storm
Correct Answer:
Verified
Q13: From the options below, which of them
Q14: Compromising confidential information comes under _
A)bug
B)threat
C)vulnerability
D)attack
Q15: The full form of OSI is OSI
Q16: In layer, vulnerabilities are directly associated with
Q17: If communication between 2 people is overheard
Q18: If communication between 2 people is overheard
Q19: The information that gets transformed in encryption
Q20: A unique piece of information that is
Q21: Study of creating a d using encryption
Q23: In same keys are implemented for encrypting
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents