What floods a website with so many requests for service that it slows down or
crashes?
a. Computer virus
b. worm
c Denial-of-service attack
d. None of the above

1 Answer

Answer :

d. None of the above

Related questions

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : Which of the following applies to the implementation of an idea? a) Copyright b) Intellectual property c) Patent d) Denial of service attack

Last Answer : c) Patent

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie

Last Answer : a)Trojan Horse

Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

Last Answer : d)Worm

Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors

Last Answer : b)Virus

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : What slows runoff rain water helping to prevent floods and erosion?

Last Answer : water shed

Description : What is the purpose of a Denial of Service attack? a. Exploit a weakness in the TCP/IP stack b. To execute a Trojan on a system c. To overload a system so it is no longer operational d. To shutdown services by turning them off

Last Answer : c. To overload a system so it is no longer operational

Description : Explain denial of service attack. -Technology

Last Answer : A denial of service attack is a type of attack that consumes all the resources of a computer.

Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : Which of the following applies to the implementation of an idea? a. Copyright b. Intellectual property c. Patent d. Denial‐of‐service attack

Last Answer : c. Patent

Description : An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as .............. (A) Masquerade Attack (B) Replay Attack (C) Passive Attack (D) Denial of Service Attack

Last Answer : (B) Replay Attack

Description : An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as .............. (A) Denial of service attack (B) Masquarade attack (C) Simple attack (D) Complex attack

Last Answer : (A) Denial of service attack 

Description : The major effects of floods are a. Physical damage b. Loss of biodiversity c. Scarcity of water supply d. All of the above

Last Answer : d. All of the above

Description : Which is the main cause of cholera? a. Poor sanitation b. Floods c. Air pollution d. Poor nutrition

Last Answer : a. Poor sanitation

Description : The major man made causes of floods are a. Deforestation b. Siltation c. Bursting of dam d. All of the above

Last Answer : d. All of the above

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : How many computers and/or iPads could connect to a single Internet home service before it slows down to a crawl?

Last Answer : answer:We have three attached to AT@T and Yahoo. All three online at the same time has had no slow down time. Having four may be another story, altogether. Best bet is have all four online at the same time and monitor the results of any slowdown time.

Description : State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system. a) True, False b) False, True c) True, True d) False, False

Last Answer : c) True, True

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. a) Zombie b) Worm c) Trojan Horses d) Logic Bomb

Last Answer : c) Trojan Horses

Description : The term used to describe a terrorist attack on a computer information system is- a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : The term used to describe a terrorist attack on a computer information system is a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above

Last Answer : c) Firewall

Description : A _______ is a computer program that can replicate itself and spread from one computer to another. a) Antivirus b) Pen Drive c) Mouse d) Computer Virus

Last Answer : d) Computer Virus

Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above

Last Answer : d) All of the above

Description : In Computer Crime, VIRUS stands fora. Vital Information Resouce Under Seize b.Very Important Resouce Under Seize c. Various Information Resouce Under Seize d. None of these

Last Answer : a. Vital Information Resouce Under Seize

Description : In Computer Crime, VIRUS stands fora. Vital Information Resouce Under Seize b.Very Important Resouce Under Seize c. Various Information Resouce Under Seize d. None of these

Last Answer : a. Vital Information Resouce Under Seize

Description : The type of website that is designed to build customer goodwill and to supplement other sales channels rather than sell the company's products directly is known as a -------- website a. customer service b. click-and mortar c. marketing d. corporate

Last Answer : b. click-and mortar

Description : The best way to promote a business with social media is a. to advertise your company, service and products b. to collect as many contacts as possible c. offer a lot of helpful and free information d. invite potential clients to visit your website.

Last Answer : c. offer a lot of helpful and free information

Description : Every time I logon to the website, my browser crashes, how do I get technical support?

Last Answer : It really depends on what web browser you are using. If you are using Firefox, you can go to Mozilla.org for support and downloads. For internet explorer, you need to use Microsoft.com for support.

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks. A) Worm B) Zombie C) Virus D) Trap doors

Last Answer : B) Zombie

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which mechanism is used by the computer virus ‘worm’ to duplicate itself? (1) Swap (2) Increment (3) Spawn (4) Swarm

Last Answer : Spawn

Description : If sound travels through matter (air) and gas is a medium then what medium slows down the flow of sound the most?

Last Answer : Vacuum.

Description : What takes place when moving water slows down?

Last Answer : It will start to freezes

Last Answer : 1. Delete unnecessary apps. 2. Keep a backup of the apps that you use for many days and delete them , then install them again when needed. 3. Create a custom ROM , do a Google search and you will ... . A: If you support the app on Unroot Android and you need to root the phone to get full support.

Description : Is that true?

Last Answer : Yes, it can. Smoking intoxicates the body - and any poisons can affect its development.

Description : What a period called when there business activity slows down prices and wages falls and unemployment rises?

Last Answer : That is a recession.

Description : Why isostatic rebound slows down over time?

Last Answer : Feel Free to Answer

Description : Why does a skateboard moving on a falt surface slows down and comes to a stop?

Last Answer : Need answer

Description : When an object that is moving slows down, which action must be occurring?

Last Answer : friction

Description : Refrigeration is a process which – (1) kills bacteria (2) slows down the bacterial growth (3) Inactivates the bacteria (4) Plasmolyses the bacteria

Last Answer : (2) slows down the bacterial growth Explanation: Bacteria thrive in warm, moist conditions. Refrigeration allows the temperature to be lowered so far that food can be stored for days or even months. ... at or below 4°C) slows down bacterial growth which helps reduce the risk of food borne illness.