单选题 (单选题)
_______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.
_______可以被用来使Web站点流量泛滥,以至于它不能再提供预期的服务。

A、 DDoS
B、 An AES service attack
C、 A Floodping attack
D、 All of the above
下载APP答题
由4l***t7提供 分享 举报 纠错

相关试题

单选题 (单选题)
A password manager can store passwords in an encrypted file located at which of the following storage locations?
密码管理器可以将密码存储在位于下列哪个存储位置的加密文件中?

A、Local storage
本地存储
B、Cloud storage
云存储
C、USB storage
USB存储
D、 All of the above

单选题 (单选题)
____________ is a term for a person who devises and carries out a scam in order to accomplish a goal.
____________是一个术语,指的是为了达到目的而设计和实施骗局的人。

A、 Man-in-the-middle
B、 RAT
C、 Internet worm
D、 None of the above

单选题 (单选题)_____________ exploits send deceptive messages to targeted individuals in an attempt to get those individuals to click links to infected Websites.
_____________漏洞向目标个人发送欺骗性信息,试图让这些个人点击受感染网站的链接。

A、Malware
恶意软件
B、 Rootkit
C、 Spear phishing
鱼叉式网络钓鱼
D、 Keylogger
键盘记录器

单选题 (单选题)Which of the following is not a type of spam filter(垃圾邮件过滤器)?

A、 Content
B、 Permission
C、 Blacklist
黑名单
D、 Entropy

单选题 (单选题)
When antivirus software detects malware, which of the following would not be a course of action you could take?
当杀毒软件检测到恶意软件时,以下哪项不会是你可以采取的行动?

A、Conduct a heuristic analysis.
进行行为检测。
B、Repair the infection.
修复感染。
C、Put the infected file into quarantine.
将受感染的文件隔离。
D、Delete the infected file.
删除受感染的文件。

单选题 (单选题)
A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.
计算机_________是一组自我复制的程序指令,它偷偷地附加到主机设备上的合法可执行文件上。

A、 trojan
B、 virus
C、 worm
D、 all of the above

单选题 (单选题)
A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
__________是一种设备或软件,旨在阻止未经授权的访问,同时允许授权的通信。

A、 Netstat
B、 firewall
C、 Evil Twin
D、 digital certificate

单选题 (单选题)
A virus __________ usually arrives as an email message that contains warnings about a fake virus.
病毒__________通常以电子邮件的形式到达,其中包含关于假病毒的警告。

A、 payload
B、 signature
C、 hoax
D、 dropper