NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
TCP
|
|
IP
|
|
HTTP
|
|
All of the above
|
Detailed explanation-1: -There are two general methods of DoS attacks: flooding services or crashing services. Flood attacks occur when the system receives too much traffic for the server to buffer, causing them to slow down and eventually stop.
Detailed explanation-2: -Smurf attack-a previously exploited DoS attack in which a malicious actor utilizes the broadcast address of vulnerable network by sending spoofed packets, resulting in the flooding of a targeted IP address.
Detailed explanation-3: -Malicious DoS In this case, an attacker purposefully tries to exhaust the site’s resources, denying legitimate users access. Malicious attacks can take one of two general forms: Denial of Service (DoS) or Distributed Denial of Service (DDoS).
Detailed explanation-4: -Perform a network vulnerability audit. In order to properly defend your network, you have to understand its weaknesses. Secure your infrastructure. Reduce the attack surface. Create a DoS response plan. Know the warning signs.