Matchthecontrolswiththedefinition 2points

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: (or shut down ) by sending so many requests ________ Unauthorized code in an authorized and perperly functioning program ________ Sending an e - mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information. ________ A network of hijacked computers. Hackers that contol the hijacked computers use them in a varities of Internet attacks. 2 10) Below is a list of controls. Match the controls with the definition. (2 points...
View Full Document

This document was uploaded on 03/13/2014.

Ask a homework question - tutors are online