Choose the terminology used to refer to the situation when authorized access is perceived as an intrusion or network attack.
Which of the following types of attacks is targeting a web server if thousands of computers are simultaneously sending hundreds of FIN packets with spoofed source IP addresses?
Which of the following describes a server or application that is accepting more input than the server or application is expecting?
Which of the following is used by anti-virus software to detect viruses that have not been previously identified?