1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ollegr [7]
3 years ago
7

A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to

legitimate users wishing to log on or utilize the attacked server.
1. Worms
2. Viruses
3. Trojan
4. Denial-of-Service attacks
Computers and Technology
1 answer:
Advocard [28]3 years ago
6 0

Answer:

4. A Denial of Service attack (DDOS attack).

Explanation:

A DDOS attack is a malicious attempt to disrupt the normal traffic to a service.

In essence, it sends an enormous amount of requests to the service, until the server is overwhelmed because it can't handle that much traffic, and collapses in an overflow.

Thus, regular users are not able to access their services.

Usually, attackers use a botnet, a network of "zombie" computers that have been previously infected with a malware that allows the attacker to remotely control them, then the botnet starts to send a flood of traffic from different locations, and make the attacker difficult to detect or track.

You might be interested in
A fast way to add up a column of numbers is to click in the cell below the numbers and then: Click Subtotals on the Data menu. V
Art [367]

Answer:

Click the AutoSum button on the Standard toolbar, then press ENTER

Explanation:

Excel offers a range of options to perform various mathematical operations. When numeric values are being inputted into cells, either columns or rows, the AutoSum function which is located in the home Taskbar allows for a very fast addition of the total values in the column or rows. Once the cell after the last cell value is selected, the AutoSum function is selected and the ENTER button is pressed, this will use the sum function of excel to quickly provide the total sum of all the values in the column.

3 0
3 years ago
Read 2 more answers
Using caller id is part of which step in an effective time management plan
timurjin [86]
The answer is avoid distractions.  <span>Using caller id is part of  step to avoid distractions in an effective time management plan.  </span><span>Today with caller ID available you can identify your callers. When you are focused on your task at hand and the time you have to accomplish it, you must learn to better control the telephone. </span>
5 0
3 years ago
High-end tools in project management software have enterprise and _____ functions that summarize and combine individual project
e-lub [12.9K]

Answer:

Portfolio management  is the correct option.

Explanation:

Project management software is that type of software that is used to accomplish the management related works such as planning, organizing, summarizing and many other works related to the management.

So, project management software is used for functioning the enterprise and portfolio management functions by which the employee combines and summarizes project information.

8 0
3 years ago
Power point 2016 which chart element provides the boundaries of the graphic?
SVEN [57.7K]
D. (chart elemments) - correct answer
8 0
3 years ago
To add a slide using the default layout, what should you do before clicking the New Slide button?
SIZIF [17.4K]

You have to add it and then there should be a layout button and you have to press that button

4 0
3 years ago
Other questions:
  • What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.
    9·2 answers
  • The entirety of a packet at one layer becoming the payload section at another layer is known as
    8·2 answers
  • To insert a column without using commands in any tabs, a user can _____ -click and then click insert column.
    6·2 answers
  • Which type of operating system is usually used in personal computers
    13·1 answer
  • Please help me
    10·1 answer
  • How to interchange first half of the array with second half of array in python?
    9·1 answer
  • ¿Que es la energía? (una sola respuesta es la correcta)
    11·1 answer
  • In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away.
    7·1 answer
  • 2. Explain the difference between a JMP instruction and CALL instruction
    6·1 answer
  • What does the 7 C s stand in communication skill​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!