COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This attack stops legitimate users from accessing a system, by overloading it with traffic
A
Website closure
B
Server soaking
C
Traffic swamping
D
Denial of service
Explanation: 

Detailed explanation-1: -In this case, an attacker purposefully tries to exhaust the site’s resources, denying legitimate users access. Malicious attacks can take one of two general forms: Denial of Service (DoS) or Distributed Denial of Service (DDoS).

There is 1 question to complete.