1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lera25 [3.4K]
3 years ago
11

A ____ is an e-mail attack in which the attacker routes large quantities of e-mail to the target system hoping to overwhelm the

target with so much irrelevant email that legitimate email cannot be used.
Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
3 0

Answer:

Mail bomb is the correct answer.

Explanation:

In the following statement, A mail bomb is the type of attack on e-mail of the particular person by which the attacker transfers large quantities of e-mail to the target computer in the expectation of flooding the target with so much meaningless e-mail that legitimate e-mail is not accessible. So, that's why the following answer is correct.

You might be interested in
5. Create a vector called to20 that goes from 1 to 20 (use the range notation). Now create a variable called end that goes from
Lady_Fox [76]

Answer:

creating vector:

code:  

to20 <-c(1:20) #creating to20 vector

end <-c(40:50) #creating end vector

to50 <-c(to20,21:30,end) # creating to50 vector

print(to50) # printing to50 vector

Explanation:

8 0
3 years ago
8. SQL, Oracle Report, and Visual Basic are all examples under the
Marat540 [252]
I am pretty sure the answer is the second gen
3 0
2 years ago
Which area located at the top of the word screen includes home , insert , and page layout ?
Misha Larkins [42]

Answer:

Whats your qeustion

Explanation:

4 0
3 years ago
Read 2 more answers
What tool listed below will be the most useful for developing presentation content?
eduard
An outline is going to be the best answer
8 0
4 years ago
If you want to create header, clicker the add a header button on the ___ tab
Finger [1]
On the insert tab
------------------------
6 0
3 years ago
Other questions:
  • What will be displayed if code corresponding to the following pseudocode is executed? Set Number = 4 Repeat Write 2 * Number Set
    12·1 answer
  • Who is the inventor of cpu?
    5·1 answer
  • Why do you think Google+'s engagement levels are so low? Do you think they will rise as people become more familiar with the soc
    12·1 answer
  • The function of the file server is to : 1. store data and software programs that can be used by client computers on the network.
    12·1 answer
  • Match the ocean floor feature with its characteristic.
    6·1 answer
  • Public class Dog
    7·1 answer
  • What are the different Stape of data processing cycle?​
    8·1 answer
  • In order to multitask, a computer must have two or more processors. True or False
    5·2 answers
  • when you enter a url, you’re creating a(n) ____ link, which is the full and complete address for the target document on the web.
    9·1 answer
  • Technology that transfers page images composed inside a computer directly to printing plates is called:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!