COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following protocols can be exploited to DoS
A
TCP
B
IP
C
HTTP
D
All of the above
Explanation: 

Detailed explanation-1: -There are two general methods of DoS attacks: flooding services or crashing services. Flood attacks occur when the system receives too much traffic for the server to buffer, causing them to slow down and eventually stop.

Detailed explanation-2: -Smurf attack-a previously exploited DoS attack in which a malicious actor utilizes the broadcast address of vulnerable network by sending spoofed packets, resulting in the flooding of a targeted IP address.

Detailed explanation-3: -Malicious DoS In this case, an attacker purposefully tries to exhaust the site’s resources, denying legitimate users access. Malicious attacks can take one of two general forms: Denial of Service (DoS) or Distributed Denial of Service (DDoS).

Detailed explanation-4: -Perform a network vulnerability audit. In order to properly defend your network, you have to understand its weaknesses. Secure your infrastructure. Reduce the attack surface. Create a DoS response plan. Know the warning signs.

There is 1 question to complete.