menu
Qamnty
Login
Register
My account
Edit my Profile
Private messages
My favorites
A spear-phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the targ…
Ask a Question
Questions
Unanswered
Tags
Ask a Question
A spear-phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the targ…
asked
Nov 18, 2018
107k
views
3
votes
A spear-phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
Business
high-school
Ubuntuuber
asked
by
Ubuntuuber
8.5k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
2
votes
It’s false. I forgot the reason why but I had answered that question in one of my quizzes at school and got it right. Give me a thanks if I helped!! :)
Detheroc
answered
Nov 23, 2018
by
Detheroc
8.8k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Jul 26, 2021
187k
views
A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in
Bramus
asked
Jul 26, 2021
by
Bramus
8.5k
points
Computers & Tech
high-school
1
answer
4
votes
187k
views
asked
Sep 15, 2024
108k
views
An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ____ attack. A. Phishing B. Ransomware C. DDoS (Distributed Denial
Karl Tarbe
asked
Sep 15, 2024
by
Karl Tarbe
8.1k
points
Computers & Tech
high-school
1
answer
5
votes
108k
views
asked
Feb 20, 2019
90.9k
views
A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system. phishing backdoor denial-of-service social engineering
Andrew Eidsness
asked
Feb 20, 2019
by
Andrew Eidsness
7.3k
points
Computers & Tech
high-school
1
answer
2
votes
90.9k
views
Ask a Question
Welcome to Qamnty — a place to ask, share, and grow together. Join our community and get real answers from real people.
Categories
All categories
Mathematics
(3.7m)
History
(955k)
English
(903k)
Biology
(716k)
Chemistry
(440k)
Physics
(405k)
Social Studies
(564k)
Advanced Placement
(27.5k)
SAT
(19.1k)
Geography
(146k)
Health
(283k)
Arts
(107k)
Business
(468k)
Computers & Tech
(195k)
French
(33.9k)
German
(4.9k)
Spanish
(174k)
Medicine
(125k)
Law
(53.4k)
Engineering
(74.2k)
Other Questions
Who was Adam Smith ? Anybody?
What can turn igneous rock into sediment?
In what way did the GI Bill contribute to the growth of professional and white-collar jobs ? A.by providing US laborers with new job-training programs B.by giving US veterans assistance to purchase a new
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qamnty