In 2000, hackers broke into hundreds of servers and planted Trojan horse .exe programs, which were then used to launch a barrage of service requests in a concerted attack at e-commerce websites, such as Yahoo! and eBay. This is an example of a distributed ________________ attack.
A) acceptance of service
B) denial of service
C) zombie
D) Trojan virus
Correct Answer:
Verified
Q91: An effective disaster recovery plan would include
Q92: Security monitors can control the use of
Q93: In most cases, the purchase of a
Q94: According to the text, GIGO stands for:
A)
Q95: _ file sharing software enables direct MP3
Q97: Which of the following is not a
Q98: _ software is not copyrighted.
Q99: Firewall software has become essential for individuals
Q100: According to the text case, _ of
Q101: Laws intended to regulate activities over the
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents