NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
This attack stops legitimate users from accessing a system, by overloading it with traffic
|
Website closure
|
|
Server soaking
|
|
Traffic swamping
|
|
Denial of service
|
Explanation:
Detailed explanation-1: -In this case, an attacker purposefully tries to exhaust the site’s resources, denying legitimate users access. Malicious attacks can take one of two general forms: Denial of Service (DoS) or Distributed Denial of Service (DDoS).
There is 1 question to complete.