Question 1
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
◦ phishing
◦ ransomware
◦ DoS
◦ DDoS
◦ SQL injection
Question 2
Which of the following is
not an example of a computer used as a target of crime?
◦ Knowingly accessing a protected computer to commit fraud
◦ Breaching the confidentiality of protected computerized data
◦ Threatening
to cause damage to a protected computer◦ Accessing a computer system without authority
◦ Illegally accessing stored electronic communication