Question

A _____ attack is used to interfere with normal access to a network host, Web site, or service, by flooding a network with useless information or with frames or packets containing errors that are not identified by a particular network service.
a. virus
b. buffer
c. denial of service
d. port scanning

Answer

This answer is hidden. It contains 1 characters.