Choose three of the following and write your response to each.
1 What are the common tools used for denial of service (DoS)?
2 How does a Virus spread?
3 What is a Buffer-Overflow attack?
4 How does a SQL injection attack take place?
5 Discuss tools that a hacker can use to crack passwords.
Combined, your responses should be 2 pages long. Be sure to provide citations from your readings to support your statements. Your well-written responses should be formatted according to APA style guidelines and wthout plagiarism.
WhatsApp us