1. A(n) ____ attack seeks to deny legitimate users access to services by either tying up a server's available resources or causing it to shut down.
2. _____ assigns a risk rating or score to each information asset. Although this number does not mean anything in absolute terms, it is useful in gauging the relative risk to each vulnerable information asset and facilitates the development of comparative ratings later in the risk control process.