Using numerous computers to inundate and overwhelm the network from numerous launch points is called

Question 20

Multiple Choice

Using numerous computers to inundate and overwhelm the network from numerous launch points is called
Question 20

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n)________ attack.


A)DDoS
B)DoS
C)SQL injection
D)phishing
E)botnet

Correct Answer:

Tags

Choose question tag

    10+ million students use Quizplus to study and prepare for their homework, quizzes and exams through 20m+ questions in 300k quizzes.

    Explore This Quiz Learn More

    Business

    Explore our library and get MIS Homework Help with various study sets and a huge amount of quizzes and questions

    View All Business Study Sets


    • Q15:

      ________ is malware that hijacks a user's computer and demands payment in return for giving back access. A)A Trojan horse B)Ransomware C)Spyware D)A virus E)An evil twin

    • Q16:

      An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of: A)click fraud. B)DDOS attack. C)spear phishing. D)pharming. E)identity theft.

    • Q17:

      Which of the following statements about Internet security is not true? A)The use of P2P networks can expose a corporate computer to outsiders. B)A corporate network without access to the Internet is more secure than one that provides access. C)Wi-Fi networks are not vulnerable to security breaches. D)Instant messaging can provide hackers access to an otherwise secure network. E)Smartphones have the same security weaknesses as other Internet devices.

    • Q18:

      All of the following are specific security challenges that threaten corporate systems in a client/server environment except: A)theft of data. B)copying of data. C)alteration of data. D)radiation. E)hardware failure.

    • Q19:

      Most computer viruses deliver a: A)worm. B)Trojan horse. C)driveby download. D)keylogger. E)payload.

    • Q21:

      As described in the chapter case,losing smartphones is a common cause of data breaches.

    • Q22:

      The term cracker is used to identify a hacker with criminal or malicious intent.

    • Q23:

      A foreign country attempting to access government networks in order to disable a national power grid is an example of: A)phishing. B)denial-of-service attacks. C)cyberwarfare. D)cyberterrorism. E)evil twins.

    • Q24:

      A computer virus replicates more quickly than a computer worm.

    • Q25:

      Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.

    Which of the following is an example of phishing quizlet?

    An example of phishing is: setting up a fake medical website that asks users for confidential information.

    Which of the following identifies the access points in a WIFI network?

    SSID. The SSID acts like a network name for your wireless access device. It has a 32-character identifier attached to the header of data packets that are sent over the WLAN.

    In which method of encryption is a single?

    Symmetric encryption uses a single key to encrypt and decrypt. If you encrypt a zip file, then decrypt with the same key, you are using symmetric encryption. Symmetric encryption is also called “secret key” encryption because the key must be kept secret from third parties.

    Which of the following is the single greatest cause of network security breaches?

    According to a study by IBM, human error is the main cause of 95% of cyber security breaches.