Top Posters
Since Sunday
s
3
3
d
3
s
2
c
2
G
2
y
2
t
2
2
k
2
j
2
e
2
New Topic  
blue_nose blue_nose
wrote...
Posts: 4020
9 years ago
________ floods a computer with requests until it shuts down denying access to legitimate users.
A) An encryption virus
B) A DoS attack
C) A polymorphic virus
D) Port blocking
Textbook 
Technology In Action Complete

Technology In Action Complete


Edition: 12th
Authors:
Read 684 times
3 Replies
Replies
Answer verified by a subject expert
popspops
wrote...
Top Poster
Posts: 4451
9 years ago
Sign in or Sign up in seconds to unlock everything for free
More solutions for this book are available here
1

Related Topics

blue_nose Author
wrote...
9 years ago
Thank you again & again.
wrote...
9 years ago
It took me a few minutes to find the answer. Make sure to study the chapter thoroughly, the content in this section isn't as straightforward as the other stuff.

Bye for now.
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1579 People Browsing
 115 Signed Up Today
Related Images
  
 2861
  
 347
  
 263
Your Opinion
What's your favorite coffee beverage?
Votes: 302

Previous poll results: Do you believe in global warming?