Question

A(n) ________ attack requires a victim host to prepare for many connections, using up resources until the computer can no longer serve legitimate users. (Choose the most specific choice.)
A) DoS
B) directly-propagating worm
C) distributed malware
D) SYN Flooding

Answer

This answer is hidden. It contains 1 characters.