menu
QAmmunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system. phishing backdoor denial-of-service social engineering
asked
Feb 20, 2019
90.9k
views
2
votes
A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system. phishing backdoor denial-of-service social engineering
Computers and Technology
high-school
Andrew Eidsness
asked
by
Andrew Eidsness
7.3k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
3
votes
Denial-of-service is correct
Kysil Ivan
answered
Feb 26, 2019
by
Kysil Ivan
8.4k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Mar 26, 2021
71.7k
views
"A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to" phishing vishing backdoor access shoulder snarfing
Abdou Amer
asked
Mar 26, 2021
by
Abdou Amer
8.8k
points
Social Studies
high-school
2
answers
1
vote
71.7k
views
asked
Sep 15, 2024
108k
views
An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ____ attack. A. Phishing B. Ransomware C. DDoS (Distributed Denial
Karl Tarbe
asked
Sep 15, 2024
by
Karl Tarbe
8.1k
points
Computers and Technology
high-school
1
answer
5
votes
108k
views
asked
Mar 2, 2017
91.6k
views
A _____ attack targets a corporate system with continuous service requests. select one: a. honeypot b. phishing c. social engineering d. denial-of-service
Ancho
asked
Mar 2, 2017
by
Ancho
9.3k
points
Social Studies
high-school
2
answers
2
votes
91.6k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
describe an advance in technology that makes life more enjoyable. what discoveries contribute to this technology?
Explain why binary codes are used to represent characters, numbers and symbols :)
What is an example of a dedicated computer system?
This is science they just dont have the subject buy anyways describe interactions you have with the environment that you depend on to meet your basic needs hope u can help
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search QAmmunity.org