COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
In DOS the attacker may be able to prevent a user from
A
accessing their emails
B
accessing websites
C
accessing social networking forums
D
encrypting data encrypting data
Explanation: 

Detailed explanation-1: -Introduction. A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic.

Detailed explanation-2: -One of the most effective ways of protecting your network against DoS attacks is to reduce the attack surface via microsegmentation. At Byos, we use endpoint microsegmentation to shrink network exposure to its most defensible component and optimize its resilience to attack.

Detailed explanation-3: -If your site is successfully attacked, it will put your content out of circulation, which could cause problems for your users if they need access to information or guidance.

There is 1 question to complete.