WIRELESS NETWORKS AND MOBILE IP
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which of the following elements is most likely to be an issue for Ping flood?
|
Confidentiality
|
|
Integrity
|
|
Availability
|
|
Non-repudiation.
|
Explanation:
Detailed explanation-1: -An Internet Control Message Protocol (ICMP) flood attack is a common distributed denial-of-service (DDoS) attack where malicious actors try to overwhelm a server or network device with ICMP pings, or echo-request packets. Typically, ICMP pings are used to determine the health of a device and the connection to it.
Detailed explanation-2: -Common DDoS attacks types. A UDP flood, by definition, is any DDoS attack that floods a target with User Datagram Protocol (UDP) packets.
There is 1 question to complete.