COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Ensuring network ____ means that authorized users have access to information, services, and network resources.
A
confidentiality
B
integrity
C
availability
D
authentication
Explanation: 

Detailed explanation-1: -A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.

Detailed explanation-2: -"Death of the perimeter” is a phrase used by network administrators to convey that creating a 100% secure network is impossible. Similar to a direct attack, an indirect attack occurs when an attacker spoofs his/her IP address. In a reflected DoS attack, attackers send spoofed requests to legitimate servers.

Detailed explanation-3: -Typically the devices in a botnet have been infected by malware, and the attacker controlling the botnet is called a “bot herder”. The devices under the control of a bot herder are called “ zombie ‘’ devices, although sometimes they are also called “bot devices” or just “bots”-hence the confusion mentioned above.

There is 1 question to complete.