1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
2 years ago
14

Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or sto

p a Web site, often to prevent legitimate users from accessing the Web site?A) Man-in-the-middle attack.
B) Cross-site scripting attack.
C) Dictionary attack.
D) DoS attack.
E) Spoofing attack.
Computers and Technology
1 answer:
Serggg [28]2 years ago
7 0

Answer: (D)DoS attack.

Explanation:

Denial of Service attack occurs when an hacker prevents the real users from accessing the service by sending excessive message to the server asking it to authenticate requests with invalid return address.

You might be interested in
"Na2SO3” represents sodium sulfite.
STatiana [176]
There are four atoms
5 0
2 years ago
Read 2 more answers
An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE
Pani-rosa [81]

Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.

Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.

Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.

Rejected Options :

Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.

6 0
3 years ago
Which of these can expose a computer to a virus? Check all that apply.
Rina8888 [55]

Answer:

downloads, websites, emails?

4 0
2 years ago
Read 2 more answers
Which of the following contains fair use?
Reptile [31]
The answer to your question is D
8 0
3 years ago
Which type of cell references are locked and NOT automatically updated when it’s copied
dsp73

Hi I would have to say B sorry if this answer is sucky but I'm trying my best to help you :D

4 0
2 years ago
Other questions:
  • Access controls are enforced automatically in FMS service routines that access and manipulate files and directories.
    9·1 answer
  • Suzy lives alone in New York, whereas her family lives in Florida. It is difficult for Suzy to visit her family very frequently,
    12·2 answers
  • A county collects property taxes on the assessed value of property, which is 60 percent of its actual value. For example, if a h
    13·1 answer
  • In an is framework, ________ is the bridge between the computer side on the left and the human side on the right
    12·1 answer
  • Write the definitions of two classes Day and Night. Both classes have no constructors, methods or instance variables. Note: For
    8·1 answer
  • Tools, documents, language and processes—these are examples of boundary objects. Which of the following is the best definition o
    11·1 answer
  • Lisa is modifying a spreadsheet. Which view will allow Lisa to see how her changes will look when she prints the spreadsheet?
    13·2 answers
  • How many worksheets display in the Excel window when you create a new blank workbook?
    10·2 answers
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    11·1 answer
  • Brainliest for whoever adds me on snap<br> gianavaughn007
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!