_________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
What type of software can be used to prevent, detect (and possibly correct) malicious activities on a system?
CORRECT TEXT Unlike like viruses and worm, __________ are bogus messages that spread via email forwarding.