COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Uses a number of computers over a network of infected machines which send req uests to a website which would bring it offline
A
SQL
B
DoS
C
WLAN
D
USB
Explanation: 

Detailed explanation-1: -Sending requests to a single server using hijacked machines (1-3) Phishing.

Detailed explanation-2: -A firewall is a network security device that monitors incoming and outgoing network traffic. It is the first line of defense in cybersecurity and acts as a barrier between a private and trusted network and an untrusted source (such as the Internet).

Detailed explanation-3: -Certified Information Security Manager(CISM).

Detailed explanation-4: -Vulnerability management is the process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the software that runs on them. This, implemented alongside with other security tactics, is vital for organizations to prioritize possible threats and minimizing their “attack surface."

There is 1 question to complete.