COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Ensuring appropriate network ____ means preventing attackers from altering the capabilities or operation of the network.
A
confidentiality
B
integrity
C
availability
D
functionality
Explanation: 

Detailed explanation-1: -There are two general methods of DoS attacks: flooding services or crashing services. Flood attacks occur when the system receives too much traffic for the server to buffer, causing them to slow down and eventually stop. Popular flood attacks include: Buffer overflow attacks – the most common DoS attack.

Detailed explanation-2: -Similar to a direct attack, an indirect attack occurs when an attacker spoofs his/her IP address. In a reflected DoS attack, attackers send spoofed requests to legitimate servers. The servers then send all responses to the victim. Most DoS attacks are difficult to detect.

There is 1 question to complete.