Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ________ attack.
A) DDoS
B) DoS
C) SQL injection
D) phishing
Correct Answer:
Verified
Q26: Hackers create a botnet by
A) infecting Web
Q28: Which of the following does not pose
Q30: _ refers to all of the methods,
Q34: A keylogger is a type of
A) worm.
B)
Q35: Inputting data into a poorly programmed Web
Q36: Electronic data are more susceptible to destruction,
Q38: Which of the following is not an
Q39: Sniffing is a security challenge that is
Q40: _ refers to policies, procedures, and technical
Q91: Packet filtering catches most types of network
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents